Apr 12 18:59:49.172016 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:59:49.172059 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:59:49.172079 kernel: BIOS-provided physical RAM map: Apr 12 18:59:49.172093 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Apr 12 18:59:49.172107 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Apr 12 18:59:49.172121 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Apr 12 18:59:49.172143 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Apr 12 18:59:49.172158 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Apr 12 18:59:49.172173 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Apr 12 18:59:49.172187 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Apr 12 18:59:49.172202 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Apr 12 18:59:49.172216 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Apr 12 18:59:49.172231 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Apr 12 18:59:49.172246 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Apr 12 18:59:49.172269 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Apr 12 18:59:49.172295 kernel: NX (Execute Disable) protection: active Apr 12 18:59:49.172310 kernel: efi: EFI v2.70 by EDK II Apr 12 18:59:49.172326 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 Apr 12 18:59:49.172343 kernel: random: crng init done Apr 12 18:59:49.172358 kernel: SMBIOS 2.4 present. Apr 12 18:59:49.172374 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Apr 12 18:59:49.172390 kernel: Hypervisor detected: KVM Apr 12 18:59:49.172411 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:59:49.172427 kernel: kvm-clock: cpu 0, msr 12191001, primary cpu clock Apr 12 18:59:49.172443 kernel: kvm-clock: using sched offset of 13586772687 cycles Apr 12 18:59:49.172460 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:59:49.172476 kernel: tsc: Detected 2299.998 MHz processor Apr 12 18:59:49.172492 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:59:49.183767 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:59:49.183803 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Apr 12 18:59:49.183828 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:59:49.183844 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Apr 12 18:59:49.183866 kernel: Using GB pages for direct mapping Apr 12 18:59:49.183881 kernel: Secure boot disabled Apr 12 18:59:49.183897 kernel: ACPI: Early table checksum verification disabled Apr 12 18:59:49.183911 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Apr 12 18:59:49.183926 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Apr 12 18:59:49.183941 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Apr 12 18:59:49.183957 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Apr 12 18:59:49.183972 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Apr 12 18:59:49.183998 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Apr 12 18:59:49.184013 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Apr 12 18:59:49.184029 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Apr 12 18:59:49.184045 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Apr 12 18:59:49.184061 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Apr 12 18:59:49.184077 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Apr 12 18:59:49.184097 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Apr 12 18:59:49.184113 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Apr 12 18:59:49.184129 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Apr 12 18:59:49.184145 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Apr 12 18:59:49.184160 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Apr 12 18:59:49.184176 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Apr 12 18:59:49.184193 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Apr 12 18:59:49.184208 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Apr 12 18:59:49.184223 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Apr 12 18:59:49.184243 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:59:49.184258 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:59:49.184274 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 18:59:49.184290 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Apr 12 18:59:49.184306 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Apr 12 18:59:49.184321 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Apr 12 18:59:49.184338 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Apr 12 18:59:49.184355 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Apr 12 18:59:49.184371 kernel: Zone ranges: Apr 12 18:59:49.184392 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:59:49.184408 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 18:59:49.184425 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:59:49.184439 kernel: Movable zone start for each node Apr 12 18:59:49.184455 kernel: Early memory node ranges Apr 12 18:59:49.184471 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Apr 12 18:59:49.184488 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Apr 12 18:59:49.184503 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Apr 12 18:59:49.191459 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Apr 12 18:59:49.191487 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:59:49.191504 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Apr 12 18:59:49.191534 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:59:49.191551 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Apr 12 18:59:49.191568 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Apr 12 18:59:49.191585 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Apr 12 18:59:49.191603 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Apr 12 18:59:49.191620 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:59:49.191637 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:59:49.191657 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:59:49.191673 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:59:49.191689 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:59:49.191706 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:59:49.191722 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:59:49.191738 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:59:49.191754 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:59:49.191771 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Apr 12 18:59:49.191788 kernel: Booting paravirtualized kernel on KVM Apr 12 18:59:49.191816 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:59:49.191833 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:59:49.191849 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:59:49.191865 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:59:49.191881 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:59:49.191897 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:59:49.191913 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:59:49.191929 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Apr 12 18:59:49.191945 kernel: Policy zone: Normal Apr 12 18:59:49.191968 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:59:49.191985 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:59:49.192002 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Apr 12 18:59:49.192019 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:59:49.192036 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:59:49.192052 kernel: Memory: 7534424K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325900K reserved, 0K cma-reserved) Apr 12 18:59:49.192068 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:59:49.192084 kernel: Kernel/User page tables isolation: enabled Apr 12 18:59:49.192105 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:59:49.192121 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:59:49.192137 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:59:49.192155 kernel: rcu: RCU event tracing is enabled. Apr 12 18:59:49.192171 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:59:49.192188 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:59:49.192206 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:59:49.192223 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:59:49.192239 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:59:49.192268 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:59:49.192302 kernel: Console: colour dummy device 80x25 Apr 12 18:59:49.192320 kernel: printk: console [ttyS0] enabled Apr 12 18:59:49.192341 kernel: ACPI: Core revision 20210730 Apr 12 18:59:49.192359 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:59:49.192375 kernel: x2apic enabled Apr 12 18:59:49.192393 kernel: Switched APIC routing to physical x2apic. Apr 12 18:59:49.192411 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Apr 12 18:59:49.192428 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:59:49.192447 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Apr 12 18:59:49.192469 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Apr 12 18:59:49.192487 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Apr 12 18:59:49.192505 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:59:49.192541 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 18:59:49.192558 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 18:59:49.192576 kernel: Spectre V2 : Mitigation: IBRS Apr 12 18:59:49.192598 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:59:49.192616 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:59:49.192635 kernel: RETBleed: Mitigation: IBRS Apr 12 18:59:49.192653 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:59:49.192670 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Apr 12 18:59:49.192687 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:59:49.192704 kernel: MDS: Mitigation: Clear CPU buffers Apr 12 18:59:49.192721 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:59:49.192739 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:59:49.192762 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:59:49.192779 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:59:49.192796 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:59:49.192822 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:59:49.192839 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:59:49.192858 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:59:49.192875 kernel: LSM: Security Framework initializing Apr 12 18:59:49.192893 kernel: SELinux: Initializing. Apr 12 18:59:49.192911 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:59:49.192933 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:59:49.192951 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Apr 12 18:59:49.192969 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Apr 12 18:59:49.192987 kernel: signal: max sigframe size: 1776 Apr 12 18:59:49.193005 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:59:49.193022 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:59:49.193040 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:59:49.193058 kernel: x86: Booting SMP configuration: Apr 12 18:59:49.193076 kernel: .... node #0, CPUs: #1 Apr 12 18:59:49.193098 kernel: kvm-clock: cpu 1, msr 12191041, secondary cpu clock Apr 12 18:59:49.193116 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:59:49.193135 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:59:49.193153 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:59:49.193171 kernel: smpboot: Max logical packages: 1 Apr 12 18:59:49.193188 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Apr 12 18:59:49.193206 kernel: devtmpfs: initialized Apr 12 18:59:49.193224 kernel: x86/mm: Memory block size: 128MB Apr 12 18:59:49.193242 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Apr 12 18:59:49.193262 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:59:49.193280 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:59:49.193299 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:59:49.193316 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:59:49.193334 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:59:49.193351 kernel: audit: type=2000 audit(1712948388.003:1): state=initialized audit_enabled=0 res=1 Apr 12 18:59:49.193369 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:59:49.193387 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:59:49.193409 kernel: cpuidle: using governor menu Apr 12 18:59:49.193426 kernel: ACPI: bus type PCI registered Apr 12 18:59:49.193444 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:59:49.193462 kernel: dca service started, version 1.12.1 Apr 12 18:59:49.193480 kernel: PCI: Using configuration type 1 for base access Apr 12 18:59:49.193498 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:59:49.205585 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:59:49.205617 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:59:49.205637 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:59:49.205655 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:59:49.205681 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:59:49.205699 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:59:49.205717 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:59:49.205734 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:59:49.205752 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:59:49.205770 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:59:49.205788 kernel: ACPI: Interpreter enabled Apr 12 18:59:49.205812 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:59:49.205830 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:59:49.205852 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:59:49.205870 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:59:49.205888 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:59:49.206143 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:59:49.206320 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:59:49.206345 kernel: PCI host bridge to bus 0000:00 Apr 12 18:59:49.206540 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:59:49.206709 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:59:49.206869 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:59:49.207017 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Apr 12 18:59:49.207168 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:59:49.207412 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:59:49.209713 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Apr 12 18:59:49.209937 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:59:49.210105 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:59:49.210283 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Apr 12 18:59:49.210478 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Apr 12 18:59:49.210698 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Apr 12 18:59:49.210901 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:59:49.211083 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Apr 12 18:59:49.211274 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Apr 12 18:59:49.211492 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:59:49.211716 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:59:49.211901 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Apr 12 18:59:49.211924 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:59:49.211940 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:59:49.211957 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:59:49.211980 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:59:49.211996 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:59:49.212014 kernel: iommu: Default domain type: Translated Apr 12 18:59:49.212031 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:59:49.212048 kernel: vgaarb: loaded Apr 12 18:59:49.212065 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:59:49.212081 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:59:49.212098 kernel: PTP clock support registered Apr 12 18:59:49.212113 kernel: Registered efivars operations Apr 12 18:59:49.212135 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:59:49.212151 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:59:49.212166 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Apr 12 18:59:49.212182 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Apr 12 18:59:49.212197 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Apr 12 18:59:49.212214 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Apr 12 18:59:49.212230 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:59:49.212247 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:59:49.212265 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:59:49.212286 kernel: pnp: PnP ACPI init Apr 12 18:59:49.212313 kernel: pnp: PnP ACPI: found 7 devices Apr 12 18:59:49.212330 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:59:49.212347 kernel: NET: Registered PF_INET protocol family Apr 12 18:59:49.212364 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:59:49.212382 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Apr 12 18:59:49.212398 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:59:49.212417 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:59:49.212435 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 18:59:49.212456 kernel: TCP: Hash tables configured (established 65536 bind 65536) Apr 12 18:59:49.212474 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:59:49.212492 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:59:49.212524 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:59:49.212542 kernel: NET: Registered PF_XDP protocol family Apr 12 18:59:49.212722 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:59:49.212906 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:59:49.213073 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:59:49.213239 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Apr 12 18:59:49.213431 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:59:49.213456 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:59:49.213476 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 18:59:49.213494 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Apr 12 18:59:49.213528 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:59:49.213546 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:59:49.213564 kernel: clocksource: Switched to clocksource tsc Apr 12 18:59:49.213586 kernel: Initialise system trusted keyrings Apr 12 18:59:49.213604 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Apr 12 18:59:49.213622 kernel: Key type asymmetric registered Apr 12 18:59:49.213640 kernel: Asymmetric key parser 'x509' registered Apr 12 18:59:49.213658 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:59:49.213676 kernel: io scheduler mq-deadline registered Apr 12 18:59:49.213694 kernel: io scheduler kyber registered Apr 12 18:59:49.213712 kernel: io scheduler bfq registered Apr 12 18:59:49.213730 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:59:49.213753 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:59:49.213942 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Apr 12 18:59:49.213968 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:59:49.214135 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Apr 12 18:59:49.214158 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:59:49.214349 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Apr 12 18:59:49.214373 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:59:49.214390 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:59:49.214405 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 18:59:49.214427 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Apr 12 18:59:49.214444 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Apr 12 18:59:49.214700 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Apr 12 18:59:49.214727 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:59:49.214744 kernel: i8042: Warning: Keylock active Apr 12 18:59:49.214760 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:59:49.214776 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:59:49.214946 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:59:49.215111 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:59:49.215268 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:59:48 UTC (1712948388) Apr 12 18:59:49.215452 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:59:49.215475 kernel: intel_pstate: CPU model not supported Apr 12 18:59:49.215494 kernel: pstore: Registered efi as persistent store backend Apr 12 18:59:49.215601 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:59:49.215619 kernel: Segment Routing with IPv6 Apr 12 18:59:49.215636 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:59:49.215658 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:59:49.215675 kernel: Key type dns_resolver registered Apr 12 18:59:49.215693 kernel: IPI shorthand broadcast: enabled Apr 12 18:59:49.215709 kernel: sched_clock: Marking stable (860613565, 149695330)->(1062974242, -52665347) Apr 12 18:59:49.215725 kernel: registered taskstats version 1 Apr 12 18:59:49.215742 kernel: Loading compiled-in X.509 certificates Apr 12 18:59:49.215759 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:59:49.215777 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:59:49.215794 kernel: Key type .fscrypt registered Apr 12 18:59:49.215814 kernel: Key type fscrypt-provisioning registered Apr 12 18:59:49.215832 kernel: pstore: Using crash dump compression: deflate Apr 12 18:59:49.215849 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:59:49.215866 kernel: ima: No architecture policies found Apr 12 18:59:49.215884 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:59:49.215901 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:59:49.215919 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:59:49.215936 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:59:49.215958 kernel: Run /init as init process Apr 12 18:59:49.215975 kernel: with arguments: Apr 12 18:59:49.215991 kernel: /init Apr 12 18:59:49.216007 kernel: with environment: Apr 12 18:59:49.216023 kernel: HOME=/ Apr 12 18:59:49.216039 kernel: TERM=linux Apr 12 18:59:49.216054 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:59:49.216075 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:59:49.216099 systemd[1]: Detected virtualization kvm. Apr 12 18:59:49.216117 systemd[1]: Detected architecture x86-64. Apr 12 18:59:49.216135 systemd[1]: Running in initrd. Apr 12 18:59:49.216153 systemd[1]: No hostname configured, using default hostname. Apr 12 18:59:49.216170 systemd[1]: Hostname set to . Apr 12 18:59:49.216189 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:59:49.216206 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:59:49.216223 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:59:49.216243 systemd[1]: Reached target cryptsetup.target. Apr 12 18:59:49.216260 systemd[1]: Reached target paths.target. Apr 12 18:59:49.216276 systemd[1]: Reached target slices.target. Apr 12 18:59:49.216294 systemd[1]: Reached target swap.target. Apr 12 18:59:49.216320 systemd[1]: Reached target timers.target. Apr 12 18:59:49.216340 systemd[1]: Listening on iscsid.socket. Apr 12 18:59:49.216359 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:59:49.216381 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:59:49.216399 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:59:49.216417 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:59:49.216435 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:59:49.216454 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:59:49.216472 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:59:49.216491 systemd[1]: Reached target sockets.target. Apr 12 18:59:49.216522 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:59:49.216540 systemd[1]: Finished network-cleanup.service. Apr 12 18:59:49.216563 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:59:49.216582 systemd[1]: Starting systemd-journald.service... Apr 12 18:59:49.216601 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:59:49.216638 systemd[1]: Starting systemd-resolved.service... Apr 12 18:59:49.216661 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:59:49.216681 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:59:49.216701 kernel: audit: type=1130 audit(1712948389.184:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.216724 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:59:49.216744 kernel: audit: type=1130 audit(1712948389.192:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.216763 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:59:49.216782 kernel: audit: type=1130 audit(1712948389.197:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.216801 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:59:49.216825 systemd-journald[189]: Journal started Apr 12 18:59:49.216921 systemd-journald[189]: Runtime Journal (/run/log/journal/aa7e81b328177e3462edf970641570ce) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:59:49.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.204414 systemd-modules-load[190]: Inserted module 'overlay' Apr 12 18:59:49.223536 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:59:49.229537 systemd[1]: Started systemd-journald.service. Apr 12 18:59:49.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.237541 kernel: audit: type=1130 audit(1712948389.231:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.246781 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:59:49.247447 systemd-resolved[191]: Positive Trust Anchors: Apr 12 18:59:49.247911 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:59:49.248137 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:59:49.253854 systemd-resolved[191]: Defaulting to hostname 'linux'. Apr 12 18:59:49.255810 systemd[1]: Started systemd-resolved.service. Apr 12 18:59:49.255956 systemd[1]: Reached target nss-lookup.target. Apr 12 18:59:49.262558 kernel: audit: type=1130 audit(1712948389.245:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.262598 kernel: audit: type=1130 audit(1712948389.254:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.269918 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:59:49.286644 kernel: audit: type=1130 audit(1712948389.272:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.275193 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:59:49.295813 dracut-cmdline[206]: dracut-dracut-053 Apr 12 18:59:49.299894 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:59:49.311621 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:59:49.319603 systemd-modules-load[190]: Inserted module 'br_netfilter' Apr 12 18:59:49.323623 kernel: Bridge firewalling registered Apr 12 18:59:49.351534 kernel: SCSI subsystem initialized Apr 12 18:59:49.370814 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:59:49.370892 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:59:49.379735 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:59:49.384918 systemd-modules-load[190]: Inserted module 'dm_multipath' Apr 12 18:59:49.386095 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:59:49.406662 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:59:49.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.416996 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:59:49.458681 kernel: audit: type=1130 audit(1712948389.414:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.458723 kernel: iscsi: registered transport (tcp) Apr 12 18:59:49.451263 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:59:49.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.495549 kernel: audit: type=1130 audit(1712948389.473:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.504116 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:59:49.504179 kernel: QLogic iSCSI HBA Driver Apr 12 18:59:49.550601 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:59:49.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:49.552007 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:59:49.613567 kernel: raid6: avx2x4 gen() 22088 MB/s Apr 12 18:59:49.634548 kernel: raid6: avx2x4 xor() 6073 MB/s Apr 12 18:59:49.655554 kernel: raid6: avx2x2 gen() 23208 MB/s Apr 12 18:59:49.676541 kernel: raid6: avx2x2 xor() 18519 MB/s Apr 12 18:59:49.697546 kernel: raid6: avx2x1 gen() 20690 MB/s Apr 12 18:59:49.718551 kernel: raid6: avx2x1 xor() 16083 MB/s Apr 12 18:59:49.739549 kernel: raid6: sse2x4 gen() 10226 MB/s Apr 12 18:59:49.760548 kernel: raid6: sse2x4 xor() 6079 MB/s Apr 12 18:59:49.781548 kernel: raid6: sse2x2 gen() 10858 MB/s Apr 12 18:59:49.802556 kernel: raid6: sse2x2 xor() 7401 MB/s Apr 12 18:59:49.823559 kernel: raid6: sse2x1 gen() 9442 MB/s Apr 12 18:59:49.849691 kernel: raid6: sse2x1 xor() 5130 MB/s Apr 12 18:59:49.849781 kernel: raid6: using algorithm avx2x2 gen() 23208 MB/s Apr 12 18:59:49.849825 kernel: raid6: .... xor() 18519 MB/s, rmw enabled Apr 12 18:59:49.855079 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:59:49.880544 kernel: xor: automatically using best checksumming function avx Apr 12 18:59:50.000543 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:59:50.012399 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:59:50.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:50.011000 audit: BPF prog-id=7 op=LOAD Apr 12 18:59:50.011000 audit: BPF prog-id=8 op=LOAD Apr 12 18:59:50.013887 systemd[1]: Starting systemd-udevd.service... Apr 12 18:59:50.031637 systemd-udevd[388]: Using default interface naming scheme 'v252'. Apr 12 18:59:50.051880 systemd[1]: Started systemd-udevd.service. Apr 12 18:59:50.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:50.061927 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:59:50.077452 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Apr 12 18:59:50.118462 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:59:50.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:50.119656 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:59:50.190926 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:59:50.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:50.264531 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:59:50.322445 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:59:50.322562 kernel: scsi host0: Virtio SCSI HBA Apr 12 18:59:50.328560 kernel: AES CTR mode by8 optimization enabled Apr 12 18:59:50.389538 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Apr 12 18:59:50.475950 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Apr 12 18:59:50.476323 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Apr 12 18:59:50.476554 kernel: sd 0:0:1:0: [sda] Write Protect is off Apr 12 18:59:50.481012 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Apr 12 18:59:50.481277 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 18:59:50.508656 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:59:50.508748 kernel: GPT:17805311 != 25165823 Apr 12 18:59:50.508771 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:59:50.514773 kernel: GPT:17805311 != 25165823 Apr 12 18:59:50.518652 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:59:50.523914 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:59:50.535532 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Apr 12 18:59:50.589678 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:59:50.604714 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (443) Apr 12 18:59:50.618714 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:59:50.618957 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:59:50.662483 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:59:50.672070 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:59:50.681329 systemd[1]: Starting disk-uuid.service... Apr 12 18:59:50.701908 disk-uuid[512]: Primary Header is updated. Apr 12 18:59:50.701908 disk-uuid[512]: Secondary Entries is updated. Apr 12 18:59:50.701908 disk-uuid[512]: Secondary Header is updated. Apr 12 18:59:50.739657 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:59:50.739701 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:59:51.729545 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:59:51.729919 disk-uuid[513]: The operation has completed successfully. Apr 12 18:59:51.805135 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:59:51.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:51.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:51.805276 systemd[1]: Finished disk-uuid.service. Apr 12 18:59:51.818783 systemd[1]: Starting verity-setup.service... Apr 12 18:59:51.847068 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:59:51.925321 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:59:51.927951 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:59:51.946977 systemd[1]: Finished verity-setup.service. Apr 12 18:59:51.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.036550 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:59:52.036983 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:59:52.043879 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:59:52.090715 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:59:52.090763 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:59:52.090786 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:59:52.044895 systemd[1]: Starting ignition-setup.service... Apr 12 18:59:52.103689 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:59:52.059886 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:59:52.135124 systemd[1]: Finished ignition-setup.service. Apr 12 18:59:52.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.136808 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:59:52.188240 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:59:52.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.196000 audit: BPF prog-id=9 op=LOAD Apr 12 18:59:52.198801 systemd[1]: Starting systemd-networkd.service... Apr 12 18:59:52.233070 systemd-networkd[685]: lo: Link UP Apr 12 18:59:52.233084 systemd-networkd[685]: lo: Gained carrier Apr 12 18:59:52.234009 systemd-networkd[685]: Enumeration completed Apr 12 18:59:52.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.234406 systemd-networkd[685]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:59:52.236259 systemd-networkd[685]: eth0: Link UP Apr 12 18:59:52.236267 systemd-networkd[685]: eth0: Gained carrier Apr 12 18:59:52.236973 systemd[1]: Started systemd-networkd.service. Apr 12 18:59:52.247630 systemd-networkd[685]: eth0: DHCPv4 address 10.128.0.14/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:59:52.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.258830 systemd[1]: Reached target network.target. Apr 12 18:59:52.275353 systemd[1]: Starting iscsiuio.service... Apr 12 18:59:52.341673 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:59:52.341673 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:59:52.341673 iscsid[694]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:59:52.341673 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:59:52.341673 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:59:52.341673 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:59:52.341673 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:59:52.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.303429 systemd[1]: Started iscsiuio.service. Apr 12 18:59:52.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.453733 ignition[639]: Ignition 2.14.0 Apr 12 18:59:52.311456 systemd[1]: Starting iscsid.service... Apr 12 18:59:52.453748 ignition[639]: Stage: fetch-offline Apr 12 18:59:52.402031 systemd[1]: Started iscsid.service. Apr 12 18:59:52.453831 ignition[639]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:52.432667 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:59:52.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.453874 ignition[639]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:52.452425 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:59:52.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.473384 ignition[639]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:52.469133 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:59:52.473625 ignition[639]: parsed url from cmdline: "" Apr 12 18:59:52.483684 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:59:52.473632 ignition[639]: no config URL provided Apr 12 18:59:52.496742 systemd[1]: Reached target remote-fs.target. Apr 12 18:59:52.473640 ignition[639]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:59:52.510940 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:59:52.473652 ignition[639]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:59:52.525134 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:59:52.473662 ignition[639]: failed to fetch config: resource requires networking Apr 12 18:59:52.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.548133 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:59:52.473828 ignition[639]: Ignition finished successfully Apr 12 18:59:52.567273 systemd[1]: Starting ignition-fetch.service... Apr 12 18:59:52.583558 ignition[709]: Ignition 2.14.0 Apr 12 18:59:52.653200 unknown[709]: fetched base config from "system" Apr 12 18:59:52.583569 ignition[709]: Stage: fetch Apr 12 18:59:52.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.653210 unknown[709]: fetched base config from "system" Apr 12 18:59:52.583733 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:52.653217 unknown[709]: fetched user config from "gcp" Apr 12 18:59:52.583775 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:52.655833 systemd[1]: Finished ignition-fetch.service. Apr 12 18:59:52.592492 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:52.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:52.667244 systemd[1]: Starting ignition-kargs.service... Apr 12 18:59:52.592736 ignition[709]: parsed url from cmdline: "" Apr 12 18:59:52.710055 systemd[1]: Finished ignition-kargs.service. Apr 12 18:59:52.592744 ignition[709]: no config URL provided Apr 12 18:59:52.726219 systemd[1]: Starting ignition-disks.service... Apr 12 18:59:52.592752 ignition[709]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:59:52.762193 systemd[1]: Finished ignition-disks.service. Apr 12 18:59:52.592764 ignition[709]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:59:52.769072 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:59:52.592800 ignition[709]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Apr 12 18:59:52.791666 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:59:52.600753 ignition[709]: GET result: OK Apr 12 18:59:52.805661 systemd[1]: Reached target local-fs.target. Apr 12 18:59:52.601018 ignition[709]: parsing config with SHA512: 85113402148a5b4342f58ecd429c79b1e6218ca0bbf865455038ee9e51cbca4b5cae2f4f0e345f25495abe2fc5ed018cee4fe1418f7a16bb06d744fddff05b12 Apr 12 18:59:52.817637 systemd[1]: Reached target sysinit.target. Apr 12 18:59:52.654025 ignition[709]: fetch: fetch complete Apr 12 18:59:52.829637 systemd[1]: Reached target basic.target. Apr 12 18:59:52.654032 ignition[709]: fetch: fetch passed Apr 12 18:59:52.843059 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:59:52.654082 ignition[709]: Ignition finished successfully Apr 12 18:59:52.688313 ignition[715]: Ignition 2.14.0 Apr 12 18:59:52.688323 ignition[715]: Stage: kargs Apr 12 18:59:52.688477 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:52.688535 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:52.696057 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:52.697798 ignition[715]: kargs: kargs passed Apr 12 18:59:52.697853 ignition[715]: Ignition finished successfully Apr 12 18:59:52.737878 ignition[721]: Ignition 2.14.0 Apr 12 18:59:52.737887 ignition[721]: Stage: disks Apr 12 18:59:52.738023 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:52.738056 ignition[721]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:52.746428 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:52.748440 ignition[721]: disks: disks passed Apr 12 18:59:52.748503 ignition[721]: Ignition finished successfully Apr 12 18:59:52.883967 systemd-fsck[729]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:59:53.010485 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:59:53.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.011779 systemd[1]: Mounting sysroot.mount... Apr 12 18:59:53.041686 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:59:53.049931 systemd[1]: Mounted sysroot.mount. Apr 12 18:59:53.056831 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:59:53.076803 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:59:53.094124 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:59:53.094204 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:59:53.094249 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:59:53.115302 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:59:53.171086 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (735) Apr 12 18:59:53.171126 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:59:53.171150 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:59:53.135025 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:59:53.182331 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:59:53.143859 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:59:53.210679 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:59:53.205197 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:59:53.219724 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:59:53.230625 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:59:53.240682 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:59:53.241023 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:59:53.281190 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:59:53.321815 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:59:53.321849 kernel: audit: type=1130 audit(1712948393.279:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.282729 systemd[1]: Starting ignition-mount.service... Apr 12 18:59:53.329910 systemd[1]: Starting sysroot-boot.service... Apr 12 18:59:53.343805 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:59:53.343987 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:59:53.371660 ignition[800]: INFO : Ignition 2.14.0 Apr 12 18:59:53.371660 ignition[800]: INFO : Stage: mount Apr 12 18:59:53.371660 ignition[800]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:53.371660 ignition[800]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:53.466693 kernel: audit: type=1130 audit(1712948393.384:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.466756 kernel: audit: type=1130 audit(1712948393.420:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:53.374310 systemd[1]: Finished sysroot-boot.service. Apr 12 18:59:53.480700 ignition[800]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:53.480700 ignition[800]: INFO : mount: mount passed Apr 12 18:59:53.480700 ignition[800]: INFO : Ignition finished successfully Apr 12 18:59:53.538684 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (811) Apr 12 18:59:53.538721 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:59:53.538738 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:59:53.538753 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:59:53.538768 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:59:53.386159 systemd[1]: Finished ignition-mount.service. Apr 12 18:59:53.423349 systemd[1]: Starting ignition-files.service... Apr 12 18:59:53.478054 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:59:53.556208 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:59:53.587794 ignition[830]: INFO : Ignition 2.14.0 Apr 12 18:59:53.587794 ignition[830]: INFO : Stage: files Apr 12 18:59:53.601662 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:53.601662 ignition[830]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:53.601662 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:53.601662 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:59:53.653670 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:59:53.653670 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:59:53.653670 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:59:53.653670 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:59:53.653670 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:59:53.653670 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:59:53.653670 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:59:53.616047 unknown[830]: wrote ssh authorized keys file for user: core Apr 12 18:59:53.808712 systemd-networkd[685]: eth0: Gained IPv6LL Apr 12 18:59:53.933282 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:59:54.257990 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:59:54.281688 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:59:54.281688 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:59:54.281688 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:59:54.542034 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:59:54.690609 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:59:54.717671 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (835) Apr 12 18:59:54.714943 systemd[1]: mnt-oem1044733484.mount: Deactivated successfully. Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1044733484" Apr 12 18:59:54.726635 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1044733484": device or resource busy Apr 12 18:59:54.726635 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1044733484", trying btrfs: device or resource busy Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1044733484" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1044733484" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem1044733484" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem1044733484" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:59:54.726635 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:59:54.930730 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Apr 12 18:59:55.017112 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:59:55.040675 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:59:55.040675 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:59:55.040675 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:59:55.102990 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Apr 12 18:59:55.443090 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: a2de71807eb4c41f4d70e5c47fac72ecf3c74984be6c08be0597fc58621baeeddc1b5cc6431ab007eee9bd0a98f8628dd21512b06daaeccfac5837e9792a98a7 Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1949678647" Apr 12 18:59:55.466679 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1949678647": device or resource busy Apr 12 18:59:55.466679 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1949678647", trying btrfs: device or resource busy Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1949678647" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1949678647" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem1949678647" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem1949678647" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:59:55.466679 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:59:55.458232 systemd[1]: mnt-oem1949678647.mount: Deactivated successfully. Apr 12 18:59:55.691674 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Apr 12 18:59:55.784672 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 18:59:55.808715 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:59:55.808715 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:59:55.808715 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:59:55.808715 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Apr 12 18:59:56.429851 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:59:56.454710 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem717443890" Apr 12 18:59:56.928683 kernel: audit: type=1130 audit(1712948396.499:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928739 kernel: audit: type=1130 audit(1712948396.583:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928766 kernel: audit: type=1130 audit(1712948396.627:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928800 kernel: audit: type=1131 audit(1712948396.627:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928818 kernel: audit: type=1130 audit(1712948396.742:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928832 kernel: audit: type=1131 audit(1712948396.764:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.928847 kernel: audit: type=1130 audit(1712948396.862:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.449023 systemd[1]: mnt-oem717443890.mount: Deactivated successfully. Apr 12 18:59:56.945683 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem717443890": device or resource busy Apr 12 18:59:56.945683 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem717443890", trying btrfs: device or resource busy Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem717443890" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem717443890" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem717443890" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem717443890" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem376304717" Apr 12 18:59:56.945683 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem376304717": device or resource busy Apr 12 18:59:56.945683 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem376304717", trying btrfs: device or resource busy Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem376304717" Apr 12 18:59:56.945683 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem376304717" Apr 12 18:59:57.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.473536 systemd[1]: mnt-oem376304717.mount: Deactivated successfully. Apr 12 18:59:57.276735 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem376304717" Apr 12 18:59:57.276735 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem376304717" Apr 12 18:59:57.276735 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(20): [started] processing unit "oem-gce.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Apr 12 18:59:57.276735 ignition[830]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:59:57.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.488448 systemd[1]: Finished ignition-files.service. Apr 12 18:59:57.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(28): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(29): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(29): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2b): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2b): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:59:57.653910 ignition[830]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:59:57.653910 ignition[830]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:59:57.653910 ignition[830]: INFO : files: files passed Apr 12 18:59:57.653910 ignition[830]: INFO : Ignition finished successfully Apr 12 18:59:57.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:57.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.003146 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:59:56.510350 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:59:58.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.041000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:59:56.541826 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:59:58.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.542906 systemd[1]: Starting ignition-quench.service... Apr 12 18:59:58.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.564203 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:59:56.585457 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:59:58.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.585663 systemd[1]: Finished ignition-quench.service. Apr 12 18:59:56.629234 systemd[1]: Reached target ignition-complete.target. Apr 12 18:59:58.146925 ignition[868]: INFO : Ignition 2.14.0 Apr 12 18:59:58.146925 ignition[868]: INFO : Stage: umount Apr 12 18:59:58.146925 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:59:58.146925 ignition[868]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:59:58.146925 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:59:58.146925 ignition[868]: INFO : umount: umount passed Apr 12 18:59:58.146925 ignition[868]: INFO : Ignition finished successfully Apr 12 18:59:58.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.692069 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:59:58.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:58.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:59:56.734763 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:59:56.734879 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:59:56.765384 systemd[1]: Reached target initrd-fs.target. Apr 12 18:59:56.806833 systemd[1]: Reached target initrd.target. Apr 12 18:59:56.821960 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:59:56.823355 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:59:58.349714 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Apr 12 18:59:58.349783 iscsid[694]: iscsid shutting down. Apr 12 18:59:56.843209 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:59:56.865351 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:59:56.914772 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:59:56.936952 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:59:56.945999 systemd[1]: Stopped target timers.target. Apr 12 18:59:56.971079 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:59:56.971279 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:59:57.015213 systemd[1]: Stopped target initrd.target. Apr 12 18:59:57.037042 systemd[1]: Stopped target basic.target. Apr 12 18:59:57.077020 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:59:57.094050 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:59:57.119033 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:59:57.141053 systemd[1]: Stopped target remote-fs.target. Apr 12 18:59:57.165077 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:59:57.190130 systemd[1]: Stopped target sysinit.target. Apr 12 18:59:57.244044 systemd[1]: Stopped target local-fs.target. Apr 12 18:59:57.269029 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:59:57.277132 systemd[1]: Stopped target swap.target. Apr 12 18:59:57.298009 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:59:57.298213 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:59:57.318151 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:59:57.359930 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:59:57.360164 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:59:57.373167 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:59:57.373367 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:59:57.408036 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:59:57.408225 systemd[1]: Stopped ignition-files.service. Apr 12 18:59:57.422489 systemd[1]: Stopping ignition-mount.service... Apr 12 18:59:57.453255 systemd[1]: Stopping iscsiuio.service... Apr 12 18:59:57.474880 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:59:57.475133 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:59:57.498759 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:59:57.514835 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:59:57.515071 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:59:57.532099 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:59:57.532273 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:59:57.559227 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:59:57.560307 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:59:57.560425 systemd[1]: Stopped iscsiuio.service. Apr 12 18:59:57.580640 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:59:57.580767 systemd[1]: Stopped ignition-mount.service. Apr 12 18:59:57.597461 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:59:57.597601 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:59:57.621253 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:59:57.621454 systemd[1]: Stopped ignition-disks.service. Apr 12 18:59:57.646805 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:59:57.646891 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:59:57.661766 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:59:57.661847 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:59:57.686783 systemd[1]: Stopped target network.target. Apr 12 18:59:57.705660 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:59:57.705772 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:59:57.725782 systemd[1]: Stopped target paths.target. Apr 12 18:59:57.745663 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:59:57.747635 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:59:57.767682 systemd[1]: Stopped target slices.target. Apr 12 18:59:57.786693 systemd[1]: Stopped target sockets.target. Apr 12 18:59:57.804727 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:59:57.804787 systemd[1]: Closed iscsid.socket. Apr 12 18:59:57.823775 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:59:57.823858 systemd[1]: Closed iscsiuio.socket. Apr 12 18:59:57.837875 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:59:57.837948 systemd[1]: Stopped ignition-setup.service. Apr 12 18:59:57.855904 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:59:57.855977 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:59:57.875105 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:59:57.879606 systemd-networkd[685]: eth0: DHCPv6 lease lost Apr 12 18:59:57.900941 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:59:57.914311 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:59:57.914435 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:59:57.932683 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:59:57.932813 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:59:57.953602 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:59:57.953720 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:59:57.982762 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:59:57.982826 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:59:57.989997 systemd[1]: Stopping network-cleanup.service... Apr 12 18:59:58.010651 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:59:58.010771 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:59:58.032918 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:59:58.033006 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:59:58.050894 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:59:58.050956 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:59:58.076046 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:59:58.091610 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:59:58.092448 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:59:58.092653 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:59:58.107756 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:59:58.107836 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:59:58.122799 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:59:58.122867 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:59:58.138756 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:59:58.138862 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:59:58.154876 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:59:58.154958 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:59:58.170843 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:59:58.170934 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:59:58.188068 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:59:58.197832 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:59:58.197933 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:59:58.224545 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:59:58.224692 systemd[1]: Stopped network-cleanup.service. Apr 12 18:59:58.241290 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:59:58.241414 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:59:58.271195 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:59:58.287834 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:59:58.310691 systemd[1]: Switching root. Apr 12 18:59:58.360757 systemd-journald[189]: Journal stopped Apr 12 19:00:03.283293 kernel: kauditd_printk_skb: 33 callbacks suppressed Apr 12 19:00:03.283423 kernel: audit: type=1334 audit(1712948398.360:77): prog-id=9 op=UNLOAD Apr 12 19:00:03.283463 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:00:03.283488 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:00:03.283522 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:00:03.283545 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:00:03.283574 kernel: SELinux: policy capability open_perms=1 Apr 12 19:00:03.283596 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:00:03.283619 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:00:03.283641 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:00:03.283663 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:00:03.283686 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:00:03.283709 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:00:03.283731 kernel: audit: type=1403 audit(1712948398.675:78): auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:00:03.283756 systemd[1]: Successfully loaded SELinux policy in 113.556ms. Apr 12 19:00:03.283803 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.110ms. Apr 12 19:00:03.283829 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:00:03.283853 systemd[1]: Detected virtualization kvm. Apr 12 19:00:03.283887 systemd[1]: Detected architecture x86-64. Apr 12 19:00:03.283911 systemd[1]: Detected first boot. Apr 12 19:00:03.283934 systemd[1]: Initializing machine ID from VM UUID. Apr 12 19:00:03.283959 kernel: audit: type=1400 audit(1712948398.826:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:00:03.283986 kernel: audit: type=1400 audit(1712948398.826:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:00:03.284008 kernel: audit: type=1334 audit(1712948398.846:81): prog-id=10 op=LOAD Apr 12 19:00:03.284030 kernel: audit: type=1334 audit(1712948398.846:82): prog-id=10 op=UNLOAD Apr 12 19:00:03.284052 kernel: audit: type=1334 audit(1712948398.867:83): prog-id=11 op=LOAD Apr 12 19:00:03.284074 kernel: audit: type=1334 audit(1712948398.867:84): prog-id=11 op=UNLOAD Apr 12 19:00:03.284097 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:00:03.284121 kernel: audit: type=1400 audit(1712948399.063:85): avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:00:03.284145 kernel: audit: type=1300 audit(1712948399.063:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:03.284171 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:00:03.284195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:00:03.284219 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:00:03.284245 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:00:03.284269 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:00:03.284293 systemd[1]: Stopped iscsid.service. Apr 12 19:00:03.284317 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:00:03.284343 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:00:03.284367 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:00:03.284393 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:00:03.284416 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:00:03.284440 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:00:03.284463 systemd[1]: Created slice system-getty.slice. Apr 12 19:00:03.284492 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:00:03.284530 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:00:03.284554 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:00:03.284578 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:00:03.284602 systemd[1]: Created slice user.slice. Apr 12 19:00:03.284625 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:00:03.284648 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:00:03.284672 systemd[1]: Set up automount boot.automount. Apr 12 19:00:03.284701 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:00:03.284725 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:00:03.284752 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:00:03.284775 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:00:03.284797 systemd[1]: Reached target integritysetup.target. Apr 12 19:00:03.284821 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:00:03.284845 systemd[1]: Reached target remote-fs.target. Apr 12 19:00:03.284874 systemd[1]: Reached target slices.target. Apr 12 19:00:03.284897 systemd[1]: Reached target swap.target. Apr 12 19:00:03.284922 systemd[1]: Reached target torcx.target. Apr 12 19:00:03.284945 systemd[1]: Reached target veritysetup.target. Apr 12 19:00:03.284969 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:00:03.284997 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:00:03.285020 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:00:03.285043 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:00:03.285066 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:00:03.285090 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:00:03.285113 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:00:03.285136 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:00:03.285159 systemd[1]: Mounting media.mount... Apr 12 19:00:03.285183 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:00:03.285210 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:00:03.285233 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:00:03.285256 systemd[1]: Mounting tmp.mount... Apr 12 19:00:03.285280 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:00:03.285303 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:00:03.285326 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:00:03.285350 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:00:03.285374 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:00:03.285397 systemd[1]: Starting modprobe@drm.service... Apr 12 19:00:03.285424 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:00:03.285449 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:00:03.285472 systemd[1]: Starting modprobe@loop.service... Apr 12 19:00:03.285494 kernel: fuse: init (API version 7.34) Apr 12 19:00:03.285528 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:00:03.285553 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:00:03.285575 kernel: loop: module loaded Apr 12 19:00:03.285597 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:00:03.285620 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:00:03.285648 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:00:03.285671 systemd[1]: Stopped systemd-journald.service. Apr 12 19:00:03.285694 systemd[1]: Starting systemd-journald.service... Apr 12 19:00:03.285718 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:00:03.285741 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:00:03.285769 systemd-journald[992]: Journal started Apr 12 19:00:03.285871 systemd-journald[992]: Runtime Journal (/run/log/journal/aa7e81b328177e3462edf970641570ce) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:59:58.360000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:59:58.675000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:59:58.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:59:58.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:59:58.846000 audit: BPF prog-id=10 op=LOAD Apr 12 18:59:58.846000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:59:58.867000 audit: BPF prog-id=11 op=LOAD Apr 12 18:59:58.867000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:59:59.063000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:59:59.063000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:59:59.063000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:59:59.073000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:59:59.073000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:59:59.073000 audit: CWD cwd="/" Apr 12 18:59:59.073000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:59:59.073000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:59:59.073000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:00:02.446000 audit: BPF prog-id=12 op=LOAD Apr 12 19:00:02.446000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:00:02.447000 audit: BPF prog-id=13 op=LOAD Apr 12 19:00:02.447000 audit: BPF prog-id=14 op=LOAD Apr 12 19:00:02.447000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:00:02.447000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:00:02.448000 audit: BPF prog-id=15 op=LOAD Apr 12 19:00:02.448000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:00:02.448000 audit: BPF prog-id=16 op=LOAD Apr 12 19:00:02.448000 audit: BPF prog-id=17 op=LOAD Apr 12 19:00:02.448000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:00:02.448000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:00:02.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:02.457000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:00:02.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:02.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:02.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.245000 audit: BPF prog-id=18 op=LOAD Apr 12 19:00:03.245000 audit: BPF prog-id=19 op=LOAD Apr 12 19:00:03.245000 audit: BPF prog-id=20 op=LOAD Apr 12 19:00:03.245000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:00:03.245000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:00:03.276000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:00:03.276000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff90ca0590 a2=4000 a3=7fff90ca062c items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:03.276000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:59:59.059996 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:00:02.445470 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:59:59.060978 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:00:02.450946 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:59:59.061003 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:59:59.061045 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:59:59.061058 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:59:59.061107 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:59:59.061124 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:59:59.061347 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:59:59.061400 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:59:59.061419 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:59:59.063419 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:59:59.063471 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:59:59.063520 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:59:59.063551 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:59:59.063607 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:59:59.063635 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:59:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:00:01.821415 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:00:01.821781 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:00:01.821920 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:00:01.822157 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:00:01.822217 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:00:01.822290 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T19:00:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:00:03.304550 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:00:03.318539 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:00:03.332535 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:00:03.339030 systemd[1]: Stopped verity-setup.service. Apr 12 19:00:03.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.358542 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:00:03.367647 systemd[1]: Started systemd-journald.service. Apr 12 19:00:03.403637 kernel: kauditd_printk_skb: 37 callbacks suppressed Apr 12 19:00:03.403745 kernel: audit: type=1130 audit(1712948403.374:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.376834 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:00:03.410910 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:00:03.417844 systemd[1]: Mounted media.mount. Apr 12 19:00:03.424813 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:00:03.433771 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:00:03.442795 systemd[1]: Mounted tmp.mount. Apr 12 19:00:03.449978 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:00:03.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.459180 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:00:03.481571 kernel: audit: type=1130 audit(1712948403.457:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.490191 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:00:03.490416 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:00:03.512658 kernel: audit: type=1130 audit(1712948403.488:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.521262 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:00:03.521535 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:00:03.565760 kernel: audit: type=1130 audit(1712948403.519:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.566009 kernel: audit: type=1131 audit(1712948403.519:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.574222 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:00:03.574478 systemd[1]: Finished modprobe@drm.service. Apr 12 19:00:03.618022 kernel: audit: type=1130 audit(1712948403.572:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.618248 kernel: audit: type=1131 audit(1712948403.572:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.627253 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:00:03.627483 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:00:03.670527 kernel: audit: type=1130 audit(1712948403.625:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.670650 kernel: audit: type=1131 audit(1712948403.625:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.679248 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:00:03.679537 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:00:03.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.701612 kernel: audit: type=1130 audit(1712948403.677:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.710122 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:00:03.710366 systemd[1]: Finished modprobe@loop.service. Apr 12 19:00:03.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.719085 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:00:03.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.728044 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:00:03.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.737043 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:00:03.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.746070 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:00:03.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.755363 systemd[1]: Reached target network-pre.target. Apr 12 19:00:03.765236 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:00:03.775062 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:00:03.781650 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:00:03.784296 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:00:03.793416 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:00:03.802766 systemd-journald[992]: Time spent on flushing to /var/log/journal/aa7e81b328177e3462edf970641570ce is 84.017ms for 1191 entries. Apr 12 19:00:03.802766 systemd-journald[992]: System Journal (/var/log/journal/aa7e81b328177e3462edf970641570ce) is 8.0M, max 584.8M, 576.8M free. Apr 12 19:00:03.924765 systemd-journald[992]: Received client request to flush runtime journal. Apr 12 19:00:03.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.799813 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:00:03.801524 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:00:03.816701 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:00:03.818397 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:00:03.926152 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:00:03.827304 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:00:03.837435 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:00:03.848142 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:00:03.856782 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:00:03.865018 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:00:03.877788 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:00:03.887265 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:00:03.921081 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:00:03.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:03.930313 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:00:03.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:04.546974 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:00:04.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:04.555000 audit: BPF prog-id=21 op=LOAD Apr 12 19:00:04.555000 audit: BPF prog-id=22 op=LOAD Apr 12 19:00:04.555000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:00:04.555000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:00:04.557923 systemd[1]: Starting systemd-udevd.service... Apr 12 19:00:04.582223 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Apr 12 19:00:04.638650 systemd[1]: Started systemd-udevd.service. Apr 12 19:00:04.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:04.648000 audit: BPF prog-id=23 op=LOAD Apr 12 19:00:04.651450 systemd[1]: Starting systemd-networkd.service... Apr 12 19:00:04.665000 audit: BPF prog-id=24 op=LOAD Apr 12 19:00:04.665000 audit: BPF prog-id=25 op=LOAD Apr 12 19:00:04.665000 audit: BPF prog-id=26 op=LOAD Apr 12 19:00:04.668224 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:00:04.722433 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 19:00:04.747575 systemd[1]: Started systemd-userdbd.service. Apr 12 19:00:04.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:04.834550 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 19:00:04.898667 systemd-networkd[1023]: lo: Link UP Apr 12 19:00:04.898682 systemd-networkd[1023]: lo: Gained carrier Apr 12 19:00:04.899460 systemd-networkd[1023]: Enumeration completed Apr 12 19:00:04.899627 systemd[1]: Started systemd-networkd.service. Apr 12 19:00:04.899686 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:00:04.901731 systemd-networkd[1023]: eth0: Link UP Apr 12 19:00:04.901885 systemd-networkd[1023]: eth0: Gained carrier Apr 12 19:00:04.915590 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1017) Apr 12 19:00:04.921664 kernel: ACPI: button: Power Button [PWRF] Apr 12 19:00:04.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:04.927740 systemd-networkd[1023]: eth0: DHCPv4 address 10.128.0.14/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 19:00:04.966541 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Apr 12 19:00:04.953000 audit[1036]: AVC avc: denied { confidentiality } for pid=1036 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:00:04.953000 audit[1036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564b0e1fd360 a1=32194 a2=7fd031150bc5 a3=5 items=108 ppid=1010 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:04.953000 audit: CWD cwd="/" Apr 12 19:00:04.953000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=1 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=2 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=3 name=(null) inode=14331 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=4 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=5 name=(null) inode=14332 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=6 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=7 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=8 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=9 name=(null) inode=14334 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=10 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=11 name=(null) inode=14335 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=12 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=13 name=(null) inode=14336 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=14 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=15 name=(null) inode=14337 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=16 name=(null) inode=14333 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=17 name=(null) inode=14338 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=18 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=19 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=20 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=21 name=(null) inode=14340 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=22 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=23 name=(null) inode=14341 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=24 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=25 name=(null) inode=14342 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=26 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=27 name=(null) inode=14343 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=28 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=29 name=(null) inode=14344 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=30 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=31 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=32 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=33 name=(null) inode=14346 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=34 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=35 name=(null) inode=14347 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=36 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=37 name=(null) inode=14348 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=38 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=39 name=(null) inode=14349 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=40 name=(null) inode=14345 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=41 name=(null) inode=14350 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=42 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=43 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=44 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=45 name=(null) inode=14352 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=46 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=47 name=(null) inode=14353 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=48 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=49 name=(null) inode=14354 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=50 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=51 name=(null) inode=14355 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=52 name=(null) inode=14351 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=53 name=(null) inode=14356 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=55 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=56 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=57 name=(null) inode=14358 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=58 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=59 name=(null) inode=14359 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=60 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=61 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=62 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=63 name=(null) inode=14361 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=64 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=65 name=(null) inode=14362 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=66 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=67 name=(null) inode=14363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=68 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=69 name=(null) inode=14364 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=70 name=(null) inode=14360 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=71 name=(null) inode=14365 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=72 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=73 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=74 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=75 name=(null) inode=14367 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=76 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=77 name=(null) inode=14368 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=78 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=79 name=(null) inode=14369 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=80 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=81 name=(null) inode=14370 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=82 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=83 name=(null) inode=14371 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=84 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=85 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=86 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=87 name=(null) inode=14373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=88 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=89 name=(null) inode=14374 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=90 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=91 name=(null) inode=14375 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=92 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=93 name=(null) inode=14376 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=94 name=(null) inode=14372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=95 name=(null) inode=14377 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=96 name=(null) inode=14357 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=97 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=98 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=99 name=(null) inode=14379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=100 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=101 name=(null) inode=14380 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=102 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=103 name=(null) inode=14381 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=104 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=105 name=(null) inode=14382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=106 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PATH item=107 name=(null) inode=14383 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:00:04.953000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:00:05.012541 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Apr 12 19:00:05.020547 kernel: EDAC MC: Ver: 3.0.0 Apr 12 19:00:05.036543 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Apr 12 19:00:05.036657 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 19:00:05.057575 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 19:00:05.073704 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:00:05.085068 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:00:05.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.095455 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:00:05.129537 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:00:05.163920 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:00:05.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.172909 systemd[1]: Reached target cryptsetup.target. Apr 12 19:00:05.183439 systemd[1]: Starting lvm2-activation.service... Apr 12 19:00:05.189820 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:00:05.221012 systemd[1]: Finished lvm2-activation.service. Apr 12 19:00:05.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.229882 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:00:05.239695 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:00:05.239763 systemd[1]: Reached target local-fs.target. Apr 12 19:00:05.248702 systemd[1]: Reached target machines.target. Apr 12 19:00:05.259382 systemd[1]: Starting ldconfig.service... Apr 12 19:00:05.267990 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:00:05.268097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:00:05.269961 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:00:05.279532 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:00:05.292728 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:00:05.293200 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:00:05.293314 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:00:05.295643 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:00:05.296728 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Apr 12 19:00:05.299842 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:00:05.317779 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:00:05.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.365782 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:00:05.380893 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:00:05.400373 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:00:05.501754 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Apr 12 19:00:05.501754 systemd-fsck[1058]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 19:00:05.504828 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:00:05.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.516876 systemd[1]: Mounting boot.mount... Apr 12 19:00:05.617917 systemd[1]: Mounted boot.mount. Apr 12 19:00:05.711484 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:00:05.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.811282 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:00:05.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.822039 systemd[1]: Starting audit-rules.service... Apr 12 19:00:05.831475 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:00:05.841328 systemd[1]: Starting oem-gce-enable-oslogin.service... Apr 12 19:00:05.851379 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:00:05.859000 audit: BPF prog-id=27 op=LOAD Apr 12 19:00:05.862132 systemd[1]: Starting systemd-resolved.service... Apr 12 19:00:05.869000 audit: BPF prog-id=28 op=LOAD Apr 12 19:00:05.872675 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:00:05.881345 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:00:05.905000 audit[1070]: SYSTEM_BOOT pid=1070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.913886 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:00:05.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.923161 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:00:05.931871 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:00:05.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.968890 systemd-networkd[1023]: eth0: Gained IPv6LL Apr 12 19:00:05.973978 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Apr 12 19:00:05.974228 systemd[1]: Finished oem-gce-enable-oslogin.service. Apr 12 19:00:05.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:05.995805 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:00:06.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:06.108000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:00:06.108000 audit[1092]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd86a41350 a2=420 a3=0 items=0 ppid=1062 pid=1092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:06.108000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:00:06.111029 augenrules[1092]: No rules Apr 12 19:00:06.112595 systemd[1]: Finished audit-rules.service. Apr 12 19:00:06.124984 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:00:06.126810 systemd-timesyncd[1069]: Contacted time server 169.254.169.254:123 (169.254.169.254). Apr 12 19:00:06.126887 systemd-timesyncd[1069]: Initial clock synchronization to Fri 2024-04-12 19:00:06.268073 UTC. Apr 12 19:00:06.130553 systemd-resolved[1068]: Positive Trust Anchors: Apr 12 19:00:06.130573 systemd-resolved[1068]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:00:06.130627 systemd-resolved[1068]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:00:06.133905 systemd[1]: Reached target time-set.target. Apr 12 19:00:06.166675 systemd-resolved[1068]: Defaulting to hostname 'linux'. Apr 12 19:00:06.170680 systemd[1]: Started systemd-resolved.service. Apr 12 19:00:06.178790 systemd[1]: Reached target network.target. Apr 12 19:00:06.187668 systemd[1]: Reached target nss-lookup.target. Apr 12 19:00:06.239249 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:00:06.259904 systemd[1]: Finished ldconfig.service. Apr 12 19:00:06.268822 systemd[1]: Starting systemd-update-done.service... Apr 12 19:00:06.277760 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:00:06.278901 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:00:06.288039 systemd[1]: Finished systemd-update-done.service. Apr 12 19:00:06.296868 systemd[1]: Reached target sysinit.target. Apr 12 19:00:06.305773 systemd[1]: Started motdgen.path. Apr 12 19:00:06.312694 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:00:06.322877 systemd[1]: Started logrotate.timer. Apr 12 19:00:06.329825 systemd[1]: Started mdadm.timer. Apr 12 19:00:06.336655 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:00:06.344663 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:00:06.344738 systemd[1]: Reached target paths.target. Apr 12 19:00:06.351657 systemd[1]: Reached target timers.target. Apr 12 19:00:06.359076 systemd[1]: Listening on dbus.socket. Apr 12 19:00:06.368116 systemd[1]: Starting docker.socket... Apr 12 19:00:06.379614 systemd[1]: Listening on sshd.socket. Apr 12 19:00:06.386795 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:00:06.387684 systemd[1]: Listening on docker.socket. Apr 12 19:00:06.394826 systemd[1]: Reached target sockets.target. Apr 12 19:00:06.403651 systemd[1]: Reached target basic.target. Apr 12 19:00:06.410722 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:00:06.410766 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:00:06.412458 systemd[1]: Starting containerd.service... Apr 12 19:00:06.421121 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:00:06.431353 systemd[1]: Starting dbus.service... Apr 12 19:00:06.442363 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:00:06.451435 systemd[1]: Starting extend-filesystems.service... Apr 12 19:00:06.458689 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:00:06.460902 systemd[1]: Starting motdgen.service... Apr 12 19:00:06.467584 systemd[1]: Starting oem-gce.service... Apr 12 19:00:06.476489 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:00:06.479709 jq[1104]: false Apr 12 19:00:06.485474 systemd[1]: Starting prepare-critools.service... Apr 12 19:00:06.494393 systemd[1]: Starting prepare-helm.service... Apr 12 19:00:06.503474 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:00:06.512582 systemd[1]: Starting sshd-keygen.service... Apr 12 19:00:06.523503 systemd[1]: Starting systemd-logind.service... Apr 12 19:00:06.530667 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:00:06.530782 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Apr 12 19:00:06.531528 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:00:06.532739 systemd[1]: Starting update-engine.service... Apr 12 19:00:06.541721 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:00:06.550849 jq[1126]: true Apr 12 19:00:06.555001 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:00:06.555331 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:00:06.556055 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:00:06.556302 systemd[1]: Finished motdgen.service. Apr 12 19:00:06.569855 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:00:06.570128 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:00:06.599193 extend-filesystems[1105]: Found sda Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda1 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda2 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda3 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found usr Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda4 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda6 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda7 Apr 12 19:00:06.607759 extend-filesystems[1105]: Found sda9 Apr 12 19:00:06.607759 extend-filesystems[1105]: Checking size of /dev/sda9 Apr 12 19:00:06.676756 tar[1131]: ./ Apr 12 19:00:06.676756 tar[1131]: ./loopback Apr 12 19:00:06.677211 mkfs.ext4[1136]: mke2fs 1.46.5 (30-Dec-2021) Apr 12 19:00:06.677211 mkfs.ext4[1136]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Apr 12 19:00:06.677211 mkfs.ext4[1136]: Creating filesystem with 262144 4k blocks and 65536 inodes Apr 12 19:00:06.677211 mkfs.ext4[1136]: Filesystem UUID: 43ca6f54-7daa-467f-a335-0f1543e5fdb2 Apr 12 19:00:06.677211 mkfs.ext4[1136]: Superblock backups stored on blocks: Apr 12 19:00:06.677211 mkfs.ext4[1136]: 32768, 98304, 163840, 229376 Apr 12 19:00:06.677211 mkfs.ext4[1136]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:00:06.677211 mkfs.ext4[1136]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:00:06.677211 mkfs.ext4[1136]: Creating journal (8192 blocks): done Apr 12 19:00:06.677211 mkfs.ext4[1136]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:00:06.681240 dbus-daemon[1103]: [system] SELinux support is enabled Apr 12 19:00:06.681487 systemd[1]: Started dbus.service. Apr 12 19:00:06.684296 extend-filesystems[1105]: Resized partition /dev/sda9 Apr 12 19:00:06.696692 extend-filesystems[1148]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:00:06.719729 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Apr 12 19:00:06.686462 dbus-daemon[1103]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1023 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 19:00:06.693765 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:00:06.719995 jq[1134]: true Apr 12 19:00:06.693819 systemd[1]: Reached target system-config.target. Apr 12 19:00:06.710931 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:00:06.710990 systemd[1]: Reached target user-config.target. Apr 12 19:00:06.733933 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 19:00:06.739067 umount[1145]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Apr 12 19:00:06.741912 tar[1132]: crictl Apr 12 19:00:06.743710 systemd[1]: Starting systemd-hostnamed.service... Apr 12 19:00:06.754934 tar[1133]: linux-amd64/helm Apr 12 19:00:06.761102 update_engine[1125]: I0412 19:00:06.761044 1125 main.cc:92] Flatcar Update Engine starting Apr 12 19:00:06.769193 systemd[1]: Started update-engine.service. Apr 12 19:00:06.769772 update_engine[1125]: I0412 19:00:06.769706 1125 update_check_scheduler.cc:74] Next update check in 2m57s Apr 12 19:00:06.782536 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Apr 12 19:00:06.802240 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 19:00:06.786030 systemd[1]: Started locksmithd.service. Apr 12 19:00:06.808595 extend-filesystems[1148]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 19:00:06.808595 extend-filesystems[1148]: old_desc_blocks = 1, new_desc_blocks = 2 Apr 12 19:00:06.808595 extend-filesystems[1148]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Apr 12 19:00:06.867717 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:00:06.809868 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:00:06.867930 extend-filesystems[1105]: Resized filesystem in /dev/sda9 Apr 12 19:00:06.810294 systemd[1]: Finished extend-filesystems.service. Apr 12 19:00:06.919336 bash[1175]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:00:06.920344 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:00:07.017786 env[1135]: time="2024-04-12T19:00:07.017708573Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:00:07.086964 systemd-logind[1124]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 19:00:07.087009 systemd-logind[1124]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 19:00:07.087040 systemd-logind[1124]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 19:00:07.104055 systemd-logind[1124]: New seat seat0. Apr 12 19:00:07.108323 systemd[1]: Started systemd-logind.service. Apr 12 19:00:07.156253 tar[1131]: ./bandwidth Apr 12 19:00:07.288180 coreos-metadata[1102]: Apr 12 19:00:07.287 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Apr 12 19:00:07.293913 coreos-metadata[1102]: Apr 12 19:00:07.293 INFO Fetch failed with 404: resource not found Apr 12 19:00:07.294213 coreos-metadata[1102]: Apr 12 19:00:07.294 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Apr 12 19:00:07.295406 coreos-metadata[1102]: Apr 12 19:00:07.295 INFO Fetch successful Apr 12 19:00:07.295675 coreos-metadata[1102]: Apr 12 19:00:07.295 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Apr 12 19:00:07.297797 coreos-metadata[1102]: Apr 12 19:00:07.297 INFO Fetch failed with 404: resource not found Apr 12 19:00:07.298026 coreos-metadata[1102]: Apr 12 19:00:07.297 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Apr 12 19:00:07.299632 coreos-metadata[1102]: Apr 12 19:00:07.299 INFO Fetch failed with 404: resource not found Apr 12 19:00:07.299840 coreos-metadata[1102]: Apr 12 19:00:07.299 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Apr 12 19:00:07.301620 coreos-metadata[1102]: Apr 12 19:00:07.301 INFO Fetch successful Apr 12 19:00:07.304502 unknown[1102]: wrote ssh authorized keys file for user: core Apr 12 19:00:07.347721 update-ssh-keys[1181]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:00:07.349033 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:00:07.351846 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 19:00:07.352790 dbus-daemon[1103]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1155 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 19:00:07.359145 systemd[1]: Started systemd-hostnamed.service. Apr 12 19:00:07.360662 env[1135]: time="2024-04-12T19:00:07.360505425Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:00:07.361051 env[1135]: time="2024-04-12T19:00:07.361018787Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.364783 env[1135]: time="2024-04-12T19:00:07.364737888Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:00:07.364938 env[1135]: time="2024-04-12T19:00:07.364912730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.365426 env[1135]: time="2024-04-12T19:00:07.365385699Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:00:07.368752 env[1135]: time="2024-04-12T19:00:07.368721060Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.372734 systemd[1]: Starting polkit.service... Apr 12 19:00:07.375439 env[1135]: time="2024-04-12T19:00:07.375403552Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:00:07.375585 env[1135]: time="2024-04-12T19:00:07.375561671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.375816 env[1135]: time="2024-04-12T19:00:07.375783119Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.376316 env[1135]: time="2024-04-12T19:00:07.376275654Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:00:07.376734 env[1135]: time="2024-04-12T19:00:07.376696645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:00:07.376860 env[1135]: time="2024-04-12T19:00:07.376837338Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:00:07.377028 env[1135]: time="2024-04-12T19:00:07.377006263Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:00:07.377142 env[1135]: time="2024-04-12T19:00:07.377120010Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384650808Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384694662Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384715714Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384772019Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384796706Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384886581Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384914443Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384939277Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384962415Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.384986124Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.385009602Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.385032226Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.385168215Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:00:07.386558 env[1135]: time="2024-04-12T19:00:07.385352901Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.385962800Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386011768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386035416Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386118467Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386141626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386239863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386265078Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386286969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386309214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386338730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386360902Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.387215 env[1135]: time="2024-04-12T19:00:07.386384929Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.387869741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.387910507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.387938171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.387962753Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.387990111Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.388009534Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.388040151Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:00:07.388557 env[1135]: time="2024-04-12T19:00:07.388091906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:00:07.388982 env[1135]: time="2024-04-12T19:00:07.388417156Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.388519840Z" level=info msg="Connect containerd service" Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.389190373Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.390126803Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.390479649Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.390570485Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:00:07.393251 env[1135]: time="2024-04-12T19:00:07.391087557Z" level=info msg="containerd successfully booted in 0.374649s" Apr 12 19:00:07.390735 systemd[1]: Started containerd.service. Apr 12 19:00:07.417692 env[1135]: time="2024-04-12T19:00:07.417622254Z" level=info msg="Start subscribing containerd event" Apr 12 19:00:07.417988 env[1135]: time="2024-04-12T19:00:07.417961772Z" level=info msg="Start recovering state" Apr 12 19:00:07.418209 env[1135]: time="2024-04-12T19:00:07.418186673Z" level=info msg="Start event monitor" Apr 12 19:00:07.418603 env[1135]: time="2024-04-12T19:00:07.418573996Z" level=info msg="Start snapshots syncer" Apr 12 19:00:07.418741 env[1135]: time="2024-04-12T19:00:07.418718908Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:00:07.418840 env[1135]: time="2024-04-12T19:00:07.418816001Z" level=info msg="Start streaming server" Apr 12 19:00:07.453033 tar[1131]: ./ptp Apr 12 19:00:07.521332 polkitd[1183]: Started polkitd version 121 Apr 12 19:00:07.563378 polkitd[1183]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 19:00:07.563775 polkitd[1183]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 19:00:07.574707 polkitd[1183]: Finished loading, compiling and executing 2 rules Apr 12 19:00:07.575627 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 19:00:07.575865 systemd[1]: Started polkit.service. Apr 12 19:00:07.576798 polkitd[1183]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 19:00:07.609655 systemd-hostnamed[1155]: Hostname set to (transient) Apr 12 19:00:07.613747 systemd-resolved[1068]: System hostname changed to 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal'. Apr 12 19:00:07.757742 tar[1131]: ./vlan Apr 12 19:00:07.944353 tar[1131]: ./host-device Apr 12 19:00:08.071338 tar[1131]: ./tuning Apr 12 19:00:08.212867 tar[1131]: ./vrf Apr 12 19:00:08.366045 tar[1131]: ./sbr Apr 12 19:00:08.531908 tar[1131]: ./tap Apr 12 19:00:08.706021 tar[1131]: ./dhcp Apr 12 19:00:09.108182 tar[1131]: ./static Apr 12 19:00:09.198316 sshd_keygen[1141]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:00:09.222296 tar[1133]: linux-amd64/LICENSE Apr 12 19:00:09.223006 tar[1133]: linux-amd64/README.md Apr 12 19:00:09.234811 tar[1131]: ./firewall Apr 12 19:00:09.241741 systemd[1]: Finished prepare-helm.service. Apr 12 19:00:09.296055 systemd[1]: Finished prepare-critools.service. Apr 12 19:00:09.316195 systemd[1]: Finished sshd-keygen.service. Apr 12 19:00:09.326278 systemd[1]: Starting issuegen.service... Apr 12 19:00:09.338231 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:00:09.338514 systemd[1]: Finished issuegen.service. Apr 12 19:00:09.348880 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:00:09.366185 tar[1131]: ./macvlan Apr 12 19:00:09.368610 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:00:09.379147 systemd[1]: Started getty@tty1.service. Apr 12 19:00:09.389008 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 19:00:09.397986 systemd[1]: Reached target getty.target. Apr 12 19:00:09.442359 tar[1131]: ./dummy Apr 12 19:00:09.502480 tar[1131]: ./bridge Apr 12 19:00:09.575955 tar[1131]: ./ipvlan Apr 12 19:00:09.645094 tar[1131]: ./portmap Apr 12 19:00:09.709247 tar[1131]: ./host-local Apr 12 19:00:09.789465 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:00:09.892992 locksmithd[1158]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:00:12.793445 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Apr 12 19:00:15.132558 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 19:00:15.160103 systemd-nspawn[1215]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Apr 12 19:00:15.160103 systemd-nspawn[1215]: Press ^] three times within 1s to kill container. Apr 12 19:00:15.175559 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:00:15.259255 systemd[1]: Started oem-gce.service. Apr 12 19:00:15.259784 systemd[1]: Reached target multi-user.target. Apr 12 19:00:15.262004 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:00:15.273211 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:00:15.273464 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:00:15.273996 systemd[1]: Startup finished in 1.224s (kernel) + 9.664s (initrd) + 16.729s (userspace) = 27.618s. Apr 12 19:00:15.356692 systemd-nspawn[1215]: + '[' -e /etc/default/instance_configs.cfg.template ']' Apr 12 19:00:15.356692 systemd-nspawn[1215]: + echo -e '[InstanceSetup]\nset_host_keys = false' Apr 12 19:00:15.357019 systemd-nspawn[1215]: + /usr/bin/google_instance_setup Apr 12 19:00:15.691284 systemd[1]: Created slice system-sshd.slice. Apr 12 19:00:15.693469 systemd[1]: Started sshd@0-10.128.0.14:22-139.178.89.65:35494.service. Apr 12 19:00:16.060697 instance-setup[1221]: INFO Running google_set_multiqueue. Apr 12 19:00:16.065689 sshd[1223]: Accepted publickey for core from 139.178.89.65 port 35494 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:16.069892 sshd[1223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:16.081674 instance-setup[1221]: INFO Set channels for eth0 to 2. Apr 12 19:00:16.088429 instance-setup[1221]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Apr 12 19:00:16.089154 systemd[1]: Created slice user-500.slice. Apr 12 19:00:16.091761 instance-setup[1221]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Apr 12 19:00:16.092833 instance-setup[1221]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Apr 12 19:00:16.093868 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:00:16.095921 instance-setup[1221]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Apr 12 19:00:16.096982 instance-setup[1221]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Apr 12 19:00:16.099708 instance-setup[1221]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Apr 12 19:00:16.100029 instance-setup[1221]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Apr 12 19:00:16.102731 instance-setup[1221]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Apr 12 19:00:16.108942 systemd-logind[1124]: New session 1 of user core. Apr 12 19:00:16.115350 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:00:16.118235 systemd[1]: Starting user@500.service... Apr 12 19:00:16.128687 instance-setup[1221]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Apr 12 19:00:16.129425 instance-setup[1221]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Apr 12 19:00:16.136783 (systemd)[1251]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:16.183891 systemd-nspawn[1215]: + /usr/bin/google_metadata_script_runner --script-type startup Apr 12 19:00:16.301631 systemd[1251]: Queued start job for default target default.target. Apr 12 19:00:16.303753 systemd[1251]: Reached target paths.target. Apr 12 19:00:16.303807 systemd[1251]: Reached target sockets.target. Apr 12 19:00:16.303834 systemd[1251]: Reached target timers.target. Apr 12 19:00:16.303859 systemd[1251]: Reached target basic.target. Apr 12 19:00:16.304071 systemd[1]: Started user@500.service. Apr 12 19:00:16.305867 systemd[1]: Started session-1.scope. Apr 12 19:00:16.309713 systemd[1251]: Reached target default.target. Apr 12 19:00:16.310138 systemd[1251]: Startup finished in 160ms. Apr 12 19:00:16.571410 systemd[1]: Started sshd@1-10.128.0.14:22-139.178.89.65:35502.service. Apr 12 19:00:16.612593 startup-script[1262]: INFO Starting startup scripts. Apr 12 19:00:16.626239 startup-script[1262]: INFO No startup scripts found in metadata. Apr 12 19:00:16.626669 startup-script[1262]: INFO Finished running startup scripts. Apr 12 19:00:16.660511 systemd-nspawn[1215]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Apr 12 19:00:16.660786 systemd-nspawn[1215]: + daemon_pids=() Apr 12 19:00:16.660786 systemd-nspawn[1215]: + for d in accounts clock_skew network Apr 12 19:00:16.661170 systemd-nspawn[1215]: + daemon_pids+=($!) Apr 12 19:00:16.661296 systemd-nspawn[1215]: + for d in accounts clock_skew network Apr 12 19:00:16.661542 systemd-nspawn[1215]: + /usr/bin/google_accounts_daemon Apr 12 19:00:16.661785 systemd-nspawn[1215]: + daemon_pids+=($!) Apr 12 19:00:16.661921 systemd-nspawn[1215]: + for d in accounts clock_skew network Apr 12 19:00:16.662314 systemd-nspawn[1215]: + daemon_pids+=($!) Apr 12 19:00:16.662531 systemd-nspawn[1215]: + NOTIFY_SOCKET=/run/systemd/notify Apr 12 19:00:16.662531 systemd-nspawn[1215]: + /usr/bin/systemd-notify --ready Apr 12 19:00:16.662678 systemd-nspawn[1215]: + /usr/bin/google_network_daemon Apr 12 19:00:16.672964 systemd-nspawn[1215]: + /usr/bin/google_clock_skew_daemon Apr 12 19:00:16.736817 systemd-nspawn[1215]: + wait -n 36 37 38 Apr 12 19:00:16.938990 sshd[1268]: Accepted publickey for core from 139.178.89.65 port 35502 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:16.940854 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:16.949563 systemd[1]: Started session-2.scope. Apr 12 19:00:16.950663 systemd-logind[1124]: New session 2 of user core. Apr 12 19:00:17.200365 sshd[1268]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:17.207646 systemd[1]: sshd@1-10.128.0.14:22-139.178.89.65:35502.service: Deactivated successfully. Apr 12 19:00:17.208910 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 19:00:17.211668 systemd-logind[1124]: Session 2 logged out. Waiting for processes to exit. Apr 12 19:00:17.213312 systemd-logind[1124]: Removed session 2. Apr 12 19:00:17.256825 systemd[1]: Started sshd@2-10.128.0.14:22-139.178.89.65:46576.service. Apr 12 19:00:17.407235 google-clock-skew[1271]: INFO Starting Google Clock Skew daemon. Apr 12 19:00:17.435876 google-clock-skew[1271]: INFO Clock drift token has changed: 0. Apr 12 19:00:17.446148 systemd-nspawn[1215]: hwclock: Cannot access the Hardware Clock via any known method. Apr 12 19:00:17.446917 systemd-nspawn[1215]: hwclock: Use the --verbose option to see the details of our search for an access method. Apr 12 19:00:17.447890 google-clock-skew[1271]: WARNING Failed to sync system time with hardware clock. Apr 12 19:00:17.470286 groupadd[1286]: group added to /etc/group: name=google-sudoers, GID=1000 Apr 12 19:00:17.475016 groupadd[1286]: group added to /etc/gshadow: name=google-sudoers Apr 12 19:00:17.479741 groupadd[1286]: new group: name=google-sudoers, GID=1000 Apr 12 19:00:17.480100 google-networking[1272]: INFO Starting Google Networking daemon. Apr 12 19:00:17.505740 google-accounts[1270]: INFO Starting Google Accounts daemon. Apr 12 19:00:17.534964 google-accounts[1270]: WARNING OS Login not installed. Apr 12 19:00:17.536671 google-accounts[1270]: INFO Creating a new user account for 0. Apr 12 19:00:17.542651 systemd-nspawn[1215]: useradd: invalid user name '0': use --badname to ignore Apr 12 19:00:17.543375 google-accounts[1270]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Apr 12 19:00:17.624223 sshd[1282]: Accepted publickey for core from 139.178.89.65 port 46576 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:17.626244 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:17.633599 systemd[1]: Started session-3.scope. Apr 12 19:00:17.634628 systemd-logind[1124]: New session 3 of user core. Apr 12 19:00:17.872367 sshd[1282]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:17.876719 systemd[1]: sshd@2-10.128.0.14:22-139.178.89.65:46576.service: Deactivated successfully. Apr 12 19:00:17.877779 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 19:00:17.878657 systemd-logind[1124]: Session 3 logged out. Waiting for processes to exit. Apr 12 19:00:17.880148 systemd-logind[1124]: Removed session 3. Apr 12 19:00:17.928173 systemd[1]: Started sshd@3-10.128.0.14:22-139.178.89.65:46586.service. Apr 12 19:00:18.268801 sshd[1302]: Accepted publickey for core from 139.178.89.65 port 46586 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:18.270806 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:18.277413 systemd[1]: Started session-4.scope. Apr 12 19:00:18.278049 systemd-logind[1124]: New session 4 of user core. Apr 12 19:00:18.519996 sshd[1302]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:18.524637 systemd[1]: sshd@3-10.128.0.14:22-139.178.89.65:46586.service: Deactivated successfully. Apr 12 19:00:18.525816 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:00:18.526688 systemd-logind[1124]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:00:18.528138 systemd-logind[1124]: Removed session 4. Apr 12 19:00:18.574999 systemd[1]: Started sshd@4-10.128.0.14:22-139.178.89.65:46594.service. Apr 12 19:00:18.917118 sshd[1308]: Accepted publickey for core from 139.178.89.65 port 46594 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:18.919419 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:18.926108 systemd[1]: Started session-5.scope. Apr 12 19:00:18.927108 systemd-logind[1124]: New session 5 of user core. Apr 12 19:00:19.144573 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:00:19.144973 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:00:19.154790 dbus-daemon[1103]: \xd0\xddGM\xf3U: received setenforce notice (enforcing=-16672608) Apr 12 19:00:19.157013 sudo[1311]: pam_unix(sudo:session): session closed for user root Apr 12 19:00:19.210843 sshd[1308]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:19.216130 systemd[1]: sshd@4-10.128.0.14:22-139.178.89.65:46594.service: Deactivated successfully. Apr 12 19:00:19.217314 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:00:19.218215 systemd-logind[1124]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:00:19.219671 systemd-logind[1124]: Removed session 5. Apr 12 19:00:19.266756 systemd[1]: Started sshd@5-10.128.0.14:22-139.178.89.65:46602.service. Apr 12 19:00:19.611871 sshd[1315]: Accepted publickey for core from 139.178.89.65 port 46602 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:19.613912 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:19.621197 systemd[1]: Started session-6.scope. Apr 12 19:00:19.622050 systemd-logind[1124]: New session 6 of user core. Apr 12 19:00:19.817900 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:00:19.818291 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:00:19.822651 sudo[1319]: pam_unix(sudo:session): session closed for user root Apr 12 19:00:19.834652 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:00:19.835045 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:00:19.847546 systemd[1]: Stopping audit-rules.service... Apr 12 19:00:19.847000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:00:19.854817 kernel: kauditd_printk_skb: 155 callbacks suppressed Apr 12 19:00:19.854919 kernel: audit: type=1305 audit(1712948419.847:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:00:19.854973 auditctl[1322]: No rules Apr 12 19:00:19.855820 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:00:19.856067 systemd[1]: Stopped audit-rules.service. Apr 12 19:00:19.871280 systemd[1]: Starting audit-rules.service... Apr 12 19:00:19.847000 audit[1322]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5fa62ba0 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:19.847000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:00:19.907214 augenrules[1339]: No rules Apr 12 19:00:19.908592 systemd[1]: Finished audit-rules.service. Apr 12 19:00:19.912995 kernel: audit: type=1300 audit(1712948419.847:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5fa62ba0 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:19.913094 kernel: audit: type=1327 audit(1712948419.847:167): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:00:19.913140 kernel: audit: type=1131 audit(1712948419.853:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.912043 sudo[1318]: pam_unix(sudo:session): session closed for user root Apr 12 19:00:19.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.935552 kernel: audit: type=1130 audit(1712948419.907:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.910000 audit[1318]: USER_END pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.957546 kernel: audit: type=1106 audit(1712948419.910:170): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.910000 audit[1318]: CRED_DISP pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.984946 kernel: audit: type=1104 audit(1712948419.910:171): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:19.985346 sshd[1315]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:19.990156 systemd-logind[1124]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:00:19.992640 systemd[1]: sshd@5-10.128.0.14:22-139.178.89.65:46602.service: Deactivated successfully. Apr 12 19:00:19.993716 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:00:19.996049 systemd-logind[1124]: Removed session 6. Apr 12 19:00:19.986000 audit[1315]: USER_END pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.005546 kernel: audit: type=1106 audit(1712948419.986:172): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.021740 systemd[1]: Started sshd@6-10.128.0.14:22-139.178.89.65:46618.service. Apr 12 19:00:19.986000 audit[1315]: CRED_DISP pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:19.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.14:22-139.178.89.65:46602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:20.088595 kernel: audit: type=1104 audit(1712948419.986:173): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.088736 kernel: audit: type=1131 audit(1712948419.991:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.14:22-139.178.89.65:46602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:20.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.14:22-139.178.89.65:46618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:20.372000 audit[1345]: USER_ACCT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.373148 sshd[1345]: Accepted publickey for core from 139.178.89.65 port 46618 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:00:20.374000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.374000 audit[1345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3931e400 a2=3 a3=0 items=0 ppid=1 pid=1345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:20.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:00:20.375215 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:00:20.382648 systemd[1]: Started session-7.scope. Apr 12 19:00:20.383638 systemd-logind[1124]: New session 7 of user core. Apr 12 19:00:20.391000 audit[1345]: USER_START pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.393000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:20.577000 audit[1348]: USER_ACCT pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:20.579457 sudo[1348]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:00:20.578000 audit[1348]: CRED_REFR pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:20.579902 sudo[1348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:00:20.581000 audit[1348]: USER_START pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:21.385634 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:00:21.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:21.394315 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:00:21.394735 systemd[1]: Reached target network-online.target. Apr 12 19:00:21.397136 systemd[1]: Starting docker.service... Apr 12 19:00:21.452316 env[1364]: time="2024-04-12T19:00:21.452231447Z" level=info msg="Starting up" Apr 12 19:00:21.455590 env[1364]: time="2024-04-12T19:00:21.455550763Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:00:21.455725 env[1364]: time="2024-04-12T19:00:21.455597389Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:00:21.455725 env[1364]: time="2024-04-12T19:00:21.455628603Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:00:21.455725 env[1364]: time="2024-04-12T19:00:21.455650303Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:00:21.459600 env[1364]: time="2024-04-12T19:00:21.459556965Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:00:21.459786 env[1364]: time="2024-04-12T19:00:21.459761334Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:00:21.459904 env[1364]: time="2024-04-12T19:00:21.459881231Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:00:21.460009 env[1364]: time="2024-04-12T19:00:21.459983302Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:00:21.470374 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1784925532-merged.mount: Deactivated successfully. Apr 12 19:00:21.515846 env[1364]: time="2024-04-12T19:00:21.515788658Z" level=info msg="Loading containers: start." Apr 12 19:00:21.606000 audit[1394]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.606000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd0abc01b0 a2=0 a3=7ffd0abc019c items=0 ppid=1364 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 19:00:21.609000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.609000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff194fdc20 a2=0 a3=7fff194fdc0c items=0 ppid=1364 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 19:00:21.612000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.612000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe811a5a40 a2=0 a3=7ffe811a5a2c items=0 ppid=1364 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.612000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:00:21.615000 audit[1400]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.615000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc4b50a50 a2=0 a3=7ffcc4b50a3c items=0 ppid=1364 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.615000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:00:21.619000 audit[1403]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.619000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffceb2916f0 a2=0 a3=7ffceb2916dc items=0 ppid=1364 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 19:00:21.641000 audit[1408]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.641000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdb82e340 a2=0 a3=7ffcdb82e32c items=0 ppid=1364 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 19:00:21.652000 audit[1410]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.652000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff489787a0 a2=0 a3=7fff4897878c items=0 ppid=1364 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 19:00:21.655000 audit[1412]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.655000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdaf50a600 a2=0 a3=7ffdaf50a5ec items=0 ppid=1364 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 19:00:21.658000 audit[1414]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.658000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd381376f0 a2=0 a3=7ffd381376dc items=0 ppid=1364 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:00:21.674000 audit[1418]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.674000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdcebf99f0 a2=0 a3=7ffdcebf99dc items=0 ppid=1364 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:00:21.676000 audit[1419]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.676000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd506744c0 a2=0 a3=7ffd506744ac items=0 ppid=1364 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:00:21.693556 kernel: Initializing XFRM netlink socket Apr 12 19:00:21.738890 env[1364]: time="2024-04-12T19:00:21.738827251Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 19:00:21.769000 audit[1427]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.769000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc3f5337a0 a2=0 a3=7ffc3f53378c items=0 ppid=1364 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 19:00:21.783000 audit[1430]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.783000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe95a576d0 a2=0 a3=7ffe95a576bc items=0 ppid=1364 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 19:00:21.788000 audit[1433]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.788000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcd12177a0 a2=0 a3=7ffcd121778c items=0 ppid=1364 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 19:00:21.792000 audit[1435]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.792000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc476e6e10 a2=0 a3=7ffc476e6dfc items=0 ppid=1364 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 19:00:21.795000 audit[1437]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.795000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe1af5a2e0 a2=0 a3=7ffe1af5a2cc items=0 ppid=1364 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.795000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 19:00:21.799000 audit[1439]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.799000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe325de600 a2=0 a3=7ffe325de5ec items=0 ppid=1364 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 19:00:21.802000 audit[1441]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.802000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe4a0bbab0 a2=0 a3=7ffe4a0bba9c items=0 ppid=1364 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.802000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 19:00:21.814000 audit[1444]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.814000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdec9ba050 a2=0 a3=7ffdec9ba03c items=0 ppid=1364 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 19:00:21.817000 audit[1446]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.817000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff67ed79e0 a2=0 a3=7fff67ed79cc items=0 ppid=1364 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:00:21.820000 audit[1448]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.820000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd1b66ea0 a2=0 a3=7ffcd1b66e8c items=0 ppid=1364 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:00:21.823000 audit[1450]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.823000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdef326de0 a2=0 a3=7ffdef326dcc items=0 ppid=1364 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 19:00:21.826186 systemd-networkd[1023]: docker0: Link UP Apr 12 19:00:21.838000 audit[1454]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.838000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0b908000 a2=0 a3=7ffc0b907fec items=0 ppid=1364 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:00:21.839000 audit[1455]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:21.839000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe04c09830 a2=0 a3=7ffe04c0981c items=0 ppid=1364 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:21.839000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:00:21.841865 env[1364]: time="2024-04-12T19:00:21.841810254Z" level=info msg="Loading containers: done." Apr 12 19:00:21.860981 env[1364]: time="2024-04-12T19:00:21.860918336Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 19:00:21.861243 env[1364]: time="2024-04-12T19:00:21.861219271Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 19:00:21.861404 env[1364]: time="2024-04-12T19:00:21.861364758Z" level=info msg="Daemon has completed initialization" Apr 12 19:00:21.882682 systemd[1]: Started docker.service. Apr 12 19:00:21.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:21.896276 env[1364]: time="2024-04-12T19:00:21.892633103Z" level=info msg="API listen on /run/docker.sock" Apr 12 19:00:21.927811 systemd[1]: Reloading. Apr 12 19:00:22.023816 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2024-04-12T19:00:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:00:22.028633 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2024-04-12T19:00:22Z" level=info msg="torcx already run" Apr 12 19:00:22.139522 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:00:22.139549 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:00:22.163133 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.253000 audit: BPF prog-id=37 op=LOAD Apr 12 19:00:22.253000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit: BPF prog-id=38 op=LOAD Apr 12 19:00:22.257000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit: BPF prog-id=39 op=LOAD Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.258000 audit: BPF prog-id=40 op=LOAD Apr 12 19:00:22.258000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:00:22.258000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit: BPF prog-id=41 op=LOAD Apr 12 19:00:22.261000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.261000 audit: BPF prog-id=42 op=LOAD Apr 12 19:00:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.262000 audit: BPF prog-id=43 op=LOAD Apr 12 19:00:22.262000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:00:22.262000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit: BPF prog-id=44 op=LOAD Apr 12 19:00:22.264000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit: BPF prog-id=45 op=LOAD Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.264000 audit: BPF prog-id=46 op=LOAD Apr 12 19:00:22.264000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:00:22.264000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.265000 audit: BPF prog-id=47 op=LOAD Apr 12 19:00:22.265000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit: BPF prog-id=48 op=LOAD Apr 12 19:00:22.268000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit: BPF prog-id=49 op=LOAD Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.268000 audit: BPF prog-id=50 op=LOAD Apr 12 19:00:22.268000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:00:22.268000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.270000 audit: BPF prog-id=51 op=LOAD Apr 12 19:00:22.270000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit: BPF prog-id=52 op=LOAD Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit: BPF prog-id=53 op=LOAD Apr 12 19:00:22.271000 audit: BPF prog-id=33 op=UNLOAD Apr 12 19:00:22.271000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:22.272000 audit: BPF prog-id=54 op=LOAD Apr 12 19:00:22.272000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:00:22.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:22.310500 systemd[1]: Started kubelet.service. Apr 12 19:00:22.405818 kubelet[1545]: E0412 19:00:22.405725 1545 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:00:22.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:00:22.408493 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:00:22.408682 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:00:22.867375 env[1135]: time="2024-04-12T19:00:22.867311561Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 19:00:23.320217 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount597211670.mount: Deactivated successfully. Apr 12 19:00:25.431731 env[1135]: time="2024-04-12T19:00:25.431642359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:25.434891 env[1135]: time="2024-04-12T19:00:25.434827903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:25.437547 env[1135]: time="2024-04-12T19:00:25.437488213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:25.440949 env[1135]: time="2024-04-12T19:00:25.440904247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:25.441976 env[1135]: time="2024-04-12T19:00:25.441920790Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533\"" Apr 12 19:00:25.458167 env[1135]: time="2024-04-12T19:00:25.458097781Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 19:00:27.383693 env[1135]: time="2024-04-12T19:00:27.383503227Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:27.386874 env[1135]: time="2024-04-12T19:00:27.386823547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:27.389446 env[1135]: time="2024-04-12T19:00:27.389395641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:27.391930 env[1135]: time="2024-04-12T19:00:27.391879015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:27.392977 env[1135]: time="2024-04-12T19:00:27.392918604Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3\"" Apr 12 19:00:27.408943 env[1135]: time="2024-04-12T19:00:27.408884780Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 19:00:28.614143 env[1135]: time="2024-04-12T19:00:28.614066155Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:28.617073 env[1135]: time="2024-04-12T19:00:28.617013031Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:28.619870 env[1135]: time="2024-04-12T19:00:28.619820797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:28.622364 env[1135]: time="2024-04-12T19:00:28.622318292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:28.623612 env[1135]: time="2024-04-12T19:00:28.623539158Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b\"" Apr 12 19:00:28.644942 env[1135]: time="2024-04-12T19:00:28.644866110Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 19:00:29.934038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount262359163.mount: Deactivated successfully. Apr 12 19:00:30.668362 env[1135]: time="2024-04-12T19:00:30.668246299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:30.671860 env[1135]: time="2024-04-12T19:00:30.671804139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:30.674405 env[1135]: time="2024-04-12T19:00:30.674363456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:30.676854 env[1135]: time="2024-04-12T19:00:30.676806729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:30.677538 env[1135]: time="2024-04-12T19:00:30.677472963Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 19:00:30.693265 env[1135]: time="2024-04-12T19:00:30.693207957Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 19:00:31.099330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount911438342.mount: Deactivated successfully. Apr 12 19:00:32.347097 env[1135]: time="2024-04-12T19:00:32.347012787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.350816 env[1135]: time="2024-04-12T19:00:32.350752091Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.353476 env[1135]: time="2024-04-12T19:00:32.353416456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.356223 env[1135]: time="2024-04-12T19:00:32.356177138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.357270 env[1135]: time="2024-04-12T19:00:32.357217217Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Apr 12 19:00:32.376498 env[1135]: time="2024-04-12T19:00:32.376429536Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 19:00:32.496009 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 19:00:32.496382 systemd[1]: Stopped kubelet.service. Apr 12 19:00:32.524636 kernel: kauditd_printk_skb: 293 callbacks suppressed Apr 12 19:00:32.524823 kernel: audit: type=1130 audit(1712948432.495:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.499854 systemd[1]: Started kubelet.service. Apr 12 19:00:32.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.569815 kernel: audit: type=1131 audit(1712948432.495:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.569981 kernel: audit: type=1130 audit(1712948432.499:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:32.619581 kubelet[1589]: E0412 19:00:32.619372 1589 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:00:32.624422 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:00:32.624717 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:00:32.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:00:32.646546 kernel: audit: type=1131 audit(1712948432.624:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:00:32.772783 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1043047047.mount: Deactivated successfully. Apr 12 19:00:32.784154 env[1135]: time="2024-04-12T19:00:32.784080491Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.787259 env[1135]: time="2024-04-12T19:00:32.787194900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.789846 env[1135]: time="2024-04-12T19:00:32.789801744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.792331 env[1135]: time="2024-04-12T19:00:32.792290048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:32.793163 env[1135]: time="2024-04-12T19:00:32.793108065Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 19:00:32.810709 env[1135]: time="2024-04-12T19:00:32.810642634Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 19:00:33.204769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3809899455.mount: Deactivated successfully. Apr 12 19:00:35.991118 env[1135]: time="2024-04-12T19:00:35.991038467Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:35.994309 env[1135]: time="2024-04-12T19:00:35.994252954Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:35.997034 env[1135]: time="2024-04-12T19:00:35.996981114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:35.999716 env[1135]: time="2024-04-12T19:00:35.999668556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:36.000828 env[1135]: time="2024-04-12T19:00:36.000771134Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Apr 12 19:00:37.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:37.655741 kernel: audit: type=1131 audit(1712948437.631:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:37.632642 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 19:00:37.670000 audit: BPF prog-id=53 op=UNLOAD Apr 12 19:00:37.686206 kernel: audit: type=1334 audit(1712948437.670:423): prog-id=53 op=UNLOAD Apr 12 19:00:37.686306 kernel: audit: type=1334 audit(1712948437.670:424): prog-id=52 op=UNLOAD Apr 12 19:00:37.670000 audit: BPF prog-id=52 op=UNLOAD Apr 12 19:00:37.670000 audit: BPF prog-id=51 op=UNLOAD Apr 12 19:00:37.693627 kernel: audit: type=1334 audit(1712948437.670:425): prog-id=51 op=UNLOAD Apr 12 19:00:39.456424 systemd[1]: Stopped kubelet.service. Apr 12 19:00:39.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:39.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:39.486327 systemd[1]: Reloading. Apr 12 19:00:39.500027 kernel: audit: type=1130 audit(1712948439.456:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:39.500153 kernel: audit: type=1131 audit(1712948439.458:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:39.605618 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2024-04-12T19:00:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:00:39.605668 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2024-04-12T19:00:39Z" level=info msg="torcx already run" Apr 12 19:00:39.699287 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:00:39.699313 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:00:39.722720 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.836617 kernel: audit: type=1400 audit(1712948439.811:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.878412 kernel: audit: type=1400 audit(1712948439.811:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.878558 kernel: audit: type=1400 audit(1712948439.811:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.878608 kernel: audit: type=1400 audit(1712948439.811:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.834000 audit: BPF prog-id=55 op=LOAD Apr 12 19:00:39.834000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit: BPF prog-id=56 op=LOAD Apr 12 19:00:39.856000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit: BPF prog-id=57 op=LOAD Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.897000 audit: BPF prog-id=58 op=LOAD Apr 12 19:00:39.897000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:00:39.898000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.901000 audit: BPF prog-id=59 op=LOAD Apr 12 19:00:39.901000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit: BPF prog-id=60 op=LOAD Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.902000 audit: BPF prog-id=61 op=LOAD Apr 12 19:00:39.902000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:00:39.902000 audit: BPF prog-id=43 op=UNLOAD Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit: BPF prog-id=62 op=LOAD Apr 12 19:00:39.904000 audit: BPF prog-id=44 op=UNLOAD Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit: BPF prog-id=63 op=LOAD Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit: BPF prog-id=64 op=LOAD Apr 12 19:00:39.905000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:00:39.905000 audit: BPF prog-id=46 op=UNLOAD Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.906000 audit: BPF prog-id=65 op=LOAD Apr 12 19:00:39.906000 audit: BPF prog-id=47 op=UNLOAD Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.907000 audit: BPF prog-id=66 op=LOAD Apr 12 19:00:39.907000 audit: BPF prog-id=48 op=UNLOAD Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit: BPF prog-id=67 op=LOAD Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.908000 audit: BPF prog-id=68 op=LOAD Apr 12 19:00:39.908000 audit: BPF prog-id=49 op=UNLOAD Apr 12 19:00:39.908000 audit: BPF prog-id=50 op=UNLOAD Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:39.911000 audit: BPF prog-id=69 op=LOAD Apr 12 19:00:39.911000 audit: BPF prog-id=54 op=UNLOAD Apr 12 19:00:39.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:39.935591 systemd[1]: Started kubelet.service. Apr 12 19:00:39.998731 kubelet[1731]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:00:39.998731 kubelet[1731]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:00:39.998731 kubelet[1731]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:00:39.998731 kubelet[1731]: I0412 19:00:39.991466 1731 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:00:40.491562 kubelet[1731]: I0412 19:00:40.491426 1731 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:00:40.491974 kubelet[1731]: I0412 19:00:40.491922 1731 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:00:40.492312 kubelet[1731]: I0412 19:00:40.492271 1731 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:00:40.497472 kubelet[1731]: E0412 19:00:40.497444 1731 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.497965 kubelet[1731]: I0412 19:00:40.497940 1731 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:00:40.508070 kubelet[1731]: I0412 19:00:40.508033 1731 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:00:40.508472 kubelet[1731]: I0412 19:00:40.508433 1731 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:00:40.508760 kubelet[1731]: I0412 19:00:40.508710 1731 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:00:40.508986 kubelet[1731]: I0412 19:00:40.508760 1731 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:00:40.508986 kubelet[1731]: I0412 19:00:40.508782 1731 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:00:40.508986 kubelet[1731]: I0412 19:00:40.508938 1731 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:00:40.509166 kubelet[1731]: I0412 19:00:40.509086 1731 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:00:40.509166 kubelet[1731]: I0412 19:00:40.509111 1731 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:00:40.509166 kubelet[1731]: I0412 19:00:40.509153 1731 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:00:40.509319 kubelet[1731]: I0412 19:00:40.509176 1731 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:00:40.510707 kubelet[1731]: W0412 19:00:40.510642 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.510826 kubelet[1731]: E0412 19:00:40.510708 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.511198 kubelet[1731]: I0412 19:00:40.511162 1731 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:00:40.511693 kubelet[1731]: I0412 19:00:40.511661 1731 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:00:40.511810 kubelet[1731]: W0412 19:00:40.511756 1731 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:00:40.514290 kubelet[1731]: W0412 19:00:40.514210 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.514449 kubelet[1731]: E0412 19:00:40.514429 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.515809 kubelet[1731]: I0412 19:00:40.515783 1731 server.go:1256] "Started kubelet" Apr 12 19:00:40.518000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:40.518000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:40.518000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d501b0 a1=c000aee900 a2=c000d50180 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.518000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:40.518000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:40.518000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:40.518000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af2840 a1=c000aee918 a2=c000d50240 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.518000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:40.521212 kubelet[1731]: I0412 19:00:40.520473 1731 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:00:40.521212 kubelet[1731]: I0412 19:00:40.520562 1731 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:00:40.521212 kubelet[1731]: I0412 19:00:40.520674 1731 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:00:40.525110 kubelet[1731]: E0412 19:00:40.525084 1731 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.14:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.14:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal.17c59d87f38004fd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,UID:ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,},FirstTimestamp:2024-04-12 19:00:40.515740925 +0000 UTC m=+0.577554622,LastTimestamp:2024-04-12 19:00:40.515740925 +0000 UTC m=+0.577554622,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,}" Apr 12 19:00:40.527842 kubelet[1731]: I0412 19:00:40.527815 1731 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:00:40.529227 kubelet[1731]: I0412 19:00:40.529201 1731 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:00:40.530788 kubelet[1731]: I0412 19:00:40.530748 1731 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:00:40.531012 kubelet[1731]: I0412 19:00:40.530976 1731 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:00:40.531274 kubelet[1731]: I0412 19:00:40.527837 1731 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:00:40.531369 kubelet[1731]: I0412 19:00:40.527865 1731 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:00:40.531427 kubelet[1731]: I0412 19:00:40.531395 1731 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:00:40.531000 audit[1741]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.531000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde40c7600 a2=0 a3=7ffde40c75ec items=0 ppid=1731 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:00:40.534115 kubelet[1731]: E0412 19:00:40.534092 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.14:6443: connect: connection refused" interval="200ms" Apr 12 19:00:40.534454 kubelet[1731]: I0412 19:00:40.534426 1731 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:00:40.534719 kubelet[1731]: I0412 19:00:40.534694 1731 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:00:40.536127 kubelet[1731]: W0412 19:00:40.536074 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.536303 kubelet[1731]: E0412 19:00:40.536277 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.537234 kubelet[1731]: E0412 19:00:40.537207 1731 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:00:40.537471 kubelet[1731]: I0412 19:00:40.537444 1731 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:00:40.537000 audit[1742]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.537000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb5664c0 a2=0 a3=7ffccb5664ac items=0 ppid=1731 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:00:40.542000 audit[1744]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.542000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd030b9530 a2=0 a3=7ffd030b951c items=0 ppid=1731 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:00:40.546000 audit[1746]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.546000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc976da5b0 a2=0 a3=7ffc976da59c items=0 ppid=1731 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:00:40.559000 audit[1750]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.559000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffecaef2b90 a2=0 a3=7ffecaef2b7c items=0 ppid=1731 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:00:40.561967 kubelet[1731]: I0412 19:00:40.561946 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:00:40.561000 audit[1751]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:00:40.561000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb92c1a70 a2=0 a3=7ffeb92c1a5c items=0 ppid=1731 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:00:40.563696 kubelet[1731]: I0412 19:00:40.563573 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:00:40.563696 kubelet[1731]: I0412 19:00:40.563606 1731 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:00:40.563696 kubelet[1731]: I0412 19:00:40.563630 1731 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:00:40.563854 kubelet[1731]: E0412 19:00:40.563706 1731 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:00:40.563000 audit[1752]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.563000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3d794220 a2=0 a3=7fff3d79420c items=0 ppid=1731 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:00:40.565000 audit[1755]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:00:40.565000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd2b5c30 a2=0 a3=7ffcfd2b5c1c items=0 ppid=1731 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:00:40.567794 kubelet[1731]: W0412 19:00:40.567695 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.567794 kubelet[1731]: E0412 19:00:40.567767 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:40.569000 audit[1757]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.569000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaf1389f0 a2=0 a3=7ffeaf1389dc items=0 ppid=1731 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:00:40.572000 audit[1758]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:00:40.572000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc3b3aa300 a2=0 a3=7ffc3b3aa2ec items=0 ppid=1731 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:00:40.576000 audit[1759]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:00:40.576000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff11b4f450 a2=0 a3=7fff11b4f43c items=0 ppid=1731 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:00:40.576000 audit[1760]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:00:40.576000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1eabd0e0 a2=0 a3=7ffe1eabd0cc items=0 ppid=1731 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:00:40.580546 kubelet[1731]: I0412 19:00:40.580483 1731 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:00:40.580673 kubelet[1731]: I0412 19:00:40.580660 1731 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:00:40.580773 kubelet[1731]: I0412 19:00:40.580762 1731 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:00:40.584684 kubelet[1731]: I0412 19:00:40.584656 1731 policy_none.go:49] "None policy: Start" Apr 12 19:00:40.585797 kubelet[1731]: I0412 19:00:40.585781 1731 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:00:40.585930 kubelet[1731]: I0412 19:00:40.585919 1731 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:00:40.594784 systemd[1]: Created slice kubepods.slice. Apr 12 19:00:40.601796 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:00:40.606247 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:00:40.612549 kubelet[1731]: I0412 19:00:40.612504 1731 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:00:40.611000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:40.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:40.611000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000669ad0 a1=c000f2f320 a2=c000669aa0 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:40.611000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:40.613731 kubelet[1731]: I0412 19:00:40.613704 1731 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:00:40.614126 kubelet[1731]: I0412 19:00:40.614104 1731 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:00:40.617560 kubelet[1731]: E0412 19:00:40.617492 1731 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" not found" Apr 12 19:00:40.633307 kubelet[1731]: I0412 19:00:40.633277 1731 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.633854 kubelet[1731]: E0412 19:00:40.633805 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.14:6443/api/v1/nodes\": dial tcp 10.128.0.14:6443: connect: connection refused" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.664297 kubelet[1731]: I0412 19:00:40.664250 1731 topology_manager.go:215] "Topology Admit Handler" podUID="f178f4b6dd13f99b7a972bd8b02a3408" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.669979 kubelet[1731]: I0412 19:00:40.669946 1731 topology_manager.go:215] "Topology Admit Handler" podUID="df0cb35802c9ce0b2029ce3547d507f4" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.684161 kubelet[1731]: I0412 19:00:40.684134 1731 topology_manager.go:215] "Topology Admit Handler" podUID="1630a49aa35b54dbc8aa2b2a3067690c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.693756 systemd[1]: Created slice kubepods-burstable-podf178f4b6dd13f99b7a972bd8b02a3408.slice. Apr 12 19:00:40.712597 systemd[1]: Created slice kubepods-burstable-poddf0cb35802c9ce0b2029ce3547d507f4.slice. Apr 12 19:00:40.721817 systemd[1]: Created slice kubepods-burstable-pod1630a49aa35b54dbc8aa2b2a3067690c.slice. Apr 12 19:00:40.735327 kubelet[1731]: E0412 19:00:40.735293 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.14:6443: connect: connection refused" interval="400ms" Apr 12 19:00:40.833003 kubelet[1731]: I0412 19:00:40.832934 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833354 kubelet[1731]: I0412 19:00:40.833327 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833529 kubelet[1731]: I0412 19:00:40.833383 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833529 kubelet[1731]: I0412 19:00:40.833420 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833529 kubelet[1731]: I0412 19:00:40.833459 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833529 kubelet[1731]: I0412 19:00:40.833499 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f178f4b6dd13f99b7a972bd8b02a3408-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"f178f4b6dd13f99b7a972bd8b02a3408\") " pod="kube-system/kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833791 kubelet[1731]: I0412 19:00:40.833564 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833791 kubelet[1731]: I0412 19:00:40.833605 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.833791 kubelet[1731]: I0412 19:00:40.833642 1731 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.839098 kubelet[1731]: I0412 19:00:40.838767 1731 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:40.839291 kubelet[1731]: E0412 19:00:40.839247 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.14:6443/api/v1/nodes\": dial tcp 10.128.0.14:6443: connect: connection refused" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:41.010932 env[1135]: time="2024-04-12T19:00:41.010868075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:f178f4b6dd13f99b7a972bd8b02a3408,Namespace:kube-system,Attempt:0,}" Apr 12 19:00:41.018223 env[1135]: time="2024-04-12T19:00:41.018159479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:df0cb35802c9ce0b2029ce3547d507f4,Namespace:kube-system,Attempt:0,}" Apr 12 19:00:41.026648 env[1135]: time="2024-04-12T19:00:41.026498978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:1630a49aa35b54dbc8aa2b2a3067690c,Namespace:kube-system,Attempt:0,}" Apr 12 19:00:41.137132 kubelet[1731]: E0412 19:00:41.136984 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.14:6443: connect: connection refused" interval="800ms" Apr 12 19:00:41.245675 kubelet[1731]: I0412 19:00:41.245633 1731 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:41.246061 kubelet[1731]: E0412 19:00:41.246032 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.14:6443/api/v1/nodes\": dial tcp 10.128.0.14:6443: connect: connection refused" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:41.437661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount493085481.mount: Deactivated successfully. Apr 12 19:00:41.453031 env[1135]: time="2024-04-12T19:00:41.452962588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.454761 env[1135]: time="2024-04-12T19:00:41.454681132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.459485 env[1135]: time="2024-04-12T19:00:41.459430512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.461451 env[1135]: time="2024-04-12T19:00:41.461376359Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.462728 env[1135]: time="2024-04-12T19:00:41.462677036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.466299 env[1135]: time="2024-04-12T19:00:41.466239858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.467549 env[1135]: time="2024-04-12T19:00:41.467484314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.469006 env[1135]: time="2024-04-12T19:00:41.468954954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.470994 env[1135]: time="2024-04-12T19:00:41.470951338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.472843 env[1135]: time="2024-04-12T19:00:41.472769594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.473988 env[1135]: time="2024-04-12T19:00:41.473950554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.477446 env[1135]: time="2024-04-12T19:00:41.477398839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:00:41.528022 env[1135]: time="2024-04-12T19:00:41.527929407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:00:41.528022 env[1135]: time="2024-04-12T19:00:41.527988976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:00:41.528397 env[1135]: time="2024-04-12T19:00:41.528332222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:00:41.529018 env[1135]: time="2024-04-12T19:00:41.528883660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1be6d6c2c67e0a3d798aa5aa5f88bc4377bb2b5fb562e65f41ecfcd1f44c85a pid=1770 runtime=io.containerd.runc.v2 Apr 12 19:00:41.548269 env[1135]: time="2024-04-12T19:00:41.548167558Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:00:41.548484 env[1135]: time="2024-04-12T19:00:41.548290782Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:00:41.548484 env[1135]: time="2024-04-12T19:00:41.548333878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:00:41.548645 env[1135]: time="2024-04-12T19:00:41.548572868Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5499c8fd9e37efea6647161837cf37da783d1e286dfc4cd561f7e496354d9249 pid=1792 runtime=io.containerd.runc.v2 Apr 12 19:00:41.553753 env[1135]: time="2024-04-12T19:00:41.553655181Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:00:41.553753 env[1135]: time="2024-04-12T19:00:41.553714614Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:00:41.554049 env[1135]: time="2024-04-12T19:00:41.553733761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:00:41.554238 env[1135]: time="2024-04-12T19:00:41.554159752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de81fa2220e7ad261caffe7a6c2faa8724a2c40b41a7659aad25103507086d70 pid=1795 runtime=io.containerd.runc.v2 Apr 12 19:00:41.588327 systemd[1]: Started cri-containerd-c1be6d6c2c67e0a3d798aa5aa5f88bc4377bb2b5fb562e65f41ecfcd1f44c85a.scope. Apr 12 19:00:41.620108 systemd[1]: Started cri-containerd-5499c8fd9e37efea6647161837cf37da783d1e286dfc4cd561f7e496354d9249.scope. Apr 12 19:00:41.642814 systemd[1]: Started cri-containerd-de81fa2220e7ad261caffe7a6c2faa8724a2c40b41a7659aad25103507086d70.scope. Apr 12 19:00:41.655209 kubelet[1731]: W0412 19:00:41.655159 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.655209 kubelet[1731]: E0412 19:00:41.655221 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.661000 audit: BPF prog-id=70 op=LOAD Apr 12 19:00:41.663000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.663000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1770 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626536643663326336376530613364373938616135616135663838 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1770 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626536643663326336376530613364373938616135616135663838 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.664000 audit: BPF prog-id=71 op=LOAD Apr 12 19:00:41.664000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000205da0 items=0 ppid=1770 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626536643663326336376530613364373938616135616135663838 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.665000 audit: BPF prog-id=72 op=LOAD Apr 12 19:00:41.665000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000205de8 items=0 ppid=1770 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626536643663326336376530613364373938616135616135663838 Apr 12 19:00:41.667000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:00:41.667000 audit: BPF prog-id=71 op=UNLOAD Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.667000 audit: BPF prog-id=73 op=LOAD Apr 12 19:00:41.667000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0004181f8 items=0 ppid=1770 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626536643663326336376530613364373938616135616135663838 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.684000 audit: BPF prog-id=74 op=LOAD Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1792 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534393963386664396533376566656136363437313631383337636633 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1792 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534393963386664396533376566656136363437313631383337636633 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit: BPF prog-id=75 op=LOAD Apr 12 19:00:41.685000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000396dc0 items=0 ppid=1792 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534393963386664396533376566656136363437313631383337636633 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit: BPF prog-id=76 op=LOAD Apr 12 19:00:41.685000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000396e08 items=0 ppid=1792 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534393963386664396533376566656136363437313631383337636633 Apr 12 19:00:41.685000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:00:41.685000 audit: BPF prog-id=75 op=UNLOAD Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.685000 audit: BPF prog-id=77 op=LOAD Apr 12 19:00:41.685000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000397218 items=0 ppid=1792 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534393963386664396533376566656136363437313631383337636633 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.731000 audit: BPF prog-id=78 op=LOAD Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1795 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383166613232323065376164323631636166666537613663326661 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1795 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383166613232323065376164323631636166666537613663326661 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.733000 audit: BPF prog-id=79 op=LOAD Apr 12 19:00:41.733000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038e5f0 items=0 ppid=1795 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383166613232323065376164323631636166666537613663326661 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.735000 audit: BPF prog-id=80 op=LOAD Apr 12 19:00:41.735000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038e638 items=0 ppid=1795 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383166613232323065376164323631636166666537613663326661 Apr 12 19:00:41.736000 audit: BPF prog-id=80 op=UNLOAD Apr 12 19:00:41.736000 audit: BPF prog-id=79 op=UNLOAD Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.736000 audit: BPF prog-id=81 op=LOAD Apr 12 19:00:41.736000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038ea48 items=0 ppid=1795 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383166613232323065376164323631636166666537613663326661 Apr 12 19:00:41.773777 env[1135]: time="2024-04-12T19:00:41.773713423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:f178f4b6dd13f99b7a972bd8b02a3408,Namespace:kube-system,Attempt:0,} returns sandbox id \"c1be6d6c2c67e0a3d798aa5aa5f88bc4377bb2b5fb562e65f41ecfcd1f44c85a\"" Apr 12 19:00:41.778046 kubelet[1731]: E0412 19:00:41.778005 1731 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-21291" Apr 12 19:00:41.801806 env[1135]: time="2024-04-12T19:00:41.801424507Z" level=info msg="CreateContainer within sandbox \"c1be6d6c2c67e0a3d798aa5aa5f88bc4377bb2b5fb562e65f41ecfcd1f44c85a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 19:00:41.803692 env[1135]: time="2024-04-12T19:00:41.803645295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:1630a49aa35b54dbc8aa2b2a3067690c,Namespace:kube-system,Attempt:0,} returns sandbox id \"5499c8fd9e37efea6647161837cf37da783d1e286dfc4cd561f7e496354d9249\"" Apr 12 19:00:41.806193 env[1135]: time="2024-04-12T19:00:41.806152174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal,Uid:df0cb35802c9ce0b2029ce3547d507f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"de81fa2220e7ad261caffe7a6c2faa8724a2c40b41a7659aad25103507086d70\"" Apr 12 19:00:41.806328 kubelet[1731]: E0412 19:00:41.806272 1731 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flat" Apr 12 19:00:41.808387 env[1135]: time="2024-04-12T19:00:41.808342246Z" level=info msg="CreateContainer within sandbox \"5499c8fd9e37efea6647161837cf37da783d1e286dfc4cd561f7e496354d9249\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 19:00:41.809784 kubelet[1731]: E0412 19:00:41.809764 1731 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-21291" Apr 12 19:00:41.812252 env[1135]: time="2024-04-12T19:00:41.812213824Z" level=info msg="CreateContainer within sandbox \"de81fa2220e7ad261caffe7a6c2faa8724a2c40b41a7659aad25103507086d70\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 19:00:41.831374 env[1135]: time="2024-04-12T19:00:41.831302104Z" level=info msg="CreateContainer within sandbox \"c1be6d6c2c67e0a3d798aa5aa5f88bc4377bb2b5fb562e65f41ecfcd1f44c85a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"10294e6c17ebf878db7badf0ea6224842bb3775a2559b367ed9fc4aec28910b8\"" Apr 12 19:00:41.832554 env[1135]: time="2024-04-12T19:00:41.832486745Z" level=info msg="StartContainer for \"10294e6c17ebf878db7badf0ea6224842bb3775a2559b367ed9fc4aec28910b8\"" Apr 12 19:00:41.843357 env[1135]: time="2024-04-12T19:00:41.843299035Z" level=info msg="CreateContainer within sandbox \"5499c8fd9e37efea6647161837cf37da783d1e286dfc4cd561f7e496354d9249\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"136324dbe335011f2e7d704345056a2f137a9d51c0708862a3a139b1fcc694e5\"" Apr 12 19:00:41.844563 env[1135]: time="2024-04-12T19:00:41.844475267Z" level=info msg="StartContainer for \"136324dbe335011f2e7d704345056a2f137a9d51c0708862a3a139b1fcc694e5\"" Apr 12 19:00:41.846672 env[1135]: time="2024-04-12T19:00:41.846626009Z" level=info msg="CreateContainer within sandbox \"de81fa2220e7ad261caffe7a6c2faa8724a2c40b41a7659aad25103507086d70\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"89c9eb02dd5dfe9590cb71b4b399bf914fc686aa10f84d2354838f928c434f0d\"" Apr 12 19:00:41.847154 env[1135]: time="2024-04-12T19:00:41.847116745Z" level=info msg="StartContainer for \"89c9eb02dd5dfe9590cb71b4b399bf914fc686aa10f84d2354838f928c434f0d\"" Apr 12 19:00:41.868225 systemd[1]: Started cri-containerd-10294e6c17ebf878db7badf0ea6224842bb3775a2559b367ed9fc4aec28910b8.scope. Apr 12 19:00:41.885991 kubelet[1731]: W0412 19:00:41.885826 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.885991 kubelet[1731]: E0412 19:00:41.885921 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.897000 audit: BPF prog-id=82 op=LOAD Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1770 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323934653663313765626638373864623762616466306561363232 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1770 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323934653663313765626638373864623762616466306561363232 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit: BPF prog-id=83 op=LOAD Apr 12 19:00:41.899000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be340 items=0 ppid=1770 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323934653663313765626638373864623762616466306561363232 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit: BPF prog-id=84 op=LOAD Apr 12 19:00:41.899000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001be388 items=0 ppid=1770 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323934653663313765626638373864623762616466306561363232 Apr 12 19:00:41.899000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:00:41.899000 audit: BPF prog-id=83 op=UNLOAD Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.899000 audit: BPF prog-id=85 op=LOAD Apr 12 19:00:41.899000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be798 items=0 ppid=1770 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323934653663313765626638373864623762616466306561363232 Apr 12 19:00:41.924855 kubelet[1731]: W0412 19:00:41.924700 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.924855 kubelet[1731]: E0412 19:00:41.924802 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:41.937355 systemd[1]: Started cri-containerd-89c9eb02dd5dfe9590cb71b4b399bf914fc686aa10f84d2354838f928c434f0d.scope. Apr 12 19:00:41.938925 kubelet[1731]: E0412 19:00:41.938830 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.14:6443: connect: connection refused" interval="1.6s" Apr 12 19:00:41.945183 systemd[1]: Started cri-containerd-136324dbe335011f2e7d704345056a2f137a9d51c0708862a3a139b1fcc694e5.scope. Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.993000 audit: BPF prog-id=86 op=LOAD Apr 12 19:00:41.994000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.996000 audit: BPF prog-id=87 op=LOAD Apr 12 19:00:41.994000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1792 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363332346462653333353031316632653764373034333435303536 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1792 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363332346462653333353031316632653764373034333435303536 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit: BPF prog-id=88 op=LOAD Apr 12 19:00:41.997000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024a60 items=0 ppid=1792 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363332346462653333353031316632653764373034333435303536 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit: BPF prog-id=89 op=LOAD Apr 12 19:00:41.997000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024aa8 items=0 ppid=1792 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363332346462653333353031316632653764373034333435303536 Apr 12 19:00:41.997000 audit: BPF prog-id=89 op=UNLOAD Apr 12 19:00:41.997000 audit: BPF prog-id=88 op=UNLOAD Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:41.997000 audit: BPF prog-id=90 op=LOAD Apr 12 19:00:41.997000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000024eb8 items=0 ppid=1792 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:41.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363332346462653333353031316632653764373034333435303536 Apr 12 19:00:42.001000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.001000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1795 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:42.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633965623032646435646665393539306362373162346233393962 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1795 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:42.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633965623032646435646665393539306362373162346233393962 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.008000 audit: BPF prog-id=91 op=LOAD Apr 12 19:00:42.008000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000098630 items=0 ppid=1795 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:42.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633965623032646435646665393539306362373162346233393962 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.009000 audit: BPF prog-id=92 op=LOAD Apr 12 19:00:42.009000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000098678 items=0 ppid=1795 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:42.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633965623032646435646665393539306362373162346233393962 Apr 12 19:00:42.012000 audit: BPF prog-id=92 op=UNLOAD Apr 12 19:00:42.012000 audit: BPF prog-id=91 op=UNLOAD Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:42.012000 audit: BPF prog-id=93 op=LOAD Apr 12 19:00:42.012000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000098a88 items=0 ppid=1795 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:42.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633965623032646435646665393539306362373162346233393962 Apr 12 19:00:42.014725 kubelet[1731]: W0412 19:00:42.011974 1731 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:42.014725 kubelet[1731]: E0412 19:00:42.012054 1731 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.14:6443: connect: connection refused Apr 12 19:00:42.014857 env[1135]: time="2024-04-12T19:00:42.014348810Z" level=info msg="StartContainer for \"10294e6c17ebf878db7badf0ea6224842bb3775a2559b367ed9fc4aec28910b8\" returns successfully" Apr 12 19:00:42.053728 kubelet[1731]: I0412 19:00:42.053686 1731 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:42.054131 kubelet[1731]: E0412 19:00:42.054100 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.14:6443/api/v1/nodes\": dial tcp 10.128.0.14:6443: connect: connection refused" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:42.074499 env[1135]: time="2024-04-12T19:00:42.074434687Z" level=info msg="StartContainer for \"136324dbe335011f2e7d704345056a2f137a9d51c0708862a3a139b1fcc694e5\" returns successfully" Apr 12 19:00:42.092366 env[1135]: time="2024-04-12T19:00:42.092289817Z" level=info msg="StartContainer for \"89c9eb02dd5dfe9590cb71b4b399bf914fc686aa10f84d2354838f928c434f0d\" returns successfully" Apr 12 19:00:43.660583 kubelet[1731]: I0412 19:00:43.660547 1731 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:45.508000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.515618 kernel: kauditd_printk_skb: 559 callbacks suppressed Apr 12 19:00:45.515768 kernel: audit: type=1400 audit(1712948445.508:724): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.517000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.583617 kernel: audit: type=1400 audit(1712948445.517:725): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.517000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f5e960 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:00:45.618549 kernel: audit: type=1300 audit(1712948445.517:725): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f5e960 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:00:45.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:00:45.652552 kernel: audit: type=1327 audit(1712948445.517:725): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:00:45.508000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000519d10 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:00:45.508000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:00:45.716981 kernel: audit: type=1300 audit(1712948445.508:724): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000519d10 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:00:45.717171 kernel: audit: type=1327 audit(1712948445.508:724): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:00:45.789000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.818540 kernel: audit: type=1400 audit(1712948445.789:726): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.789000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003390bd0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.865540 kernel: audit: type=1300 audit(1712948445.789:726): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003390bd0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.896540 kernel: audit: type=1327 audit(1712948445.789:726): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.790000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.928537 kernel: audit: type=1400 audit(1712948445.790:727): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.790000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00445e0c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.790000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.790000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.790000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003390c90 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.790000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.791000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.791000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00445e100 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.791000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.791000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003390de0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:45.812000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:00:45.812000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c005ef4f30 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:00:45.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:00:46.084365 kubelet[1731]: E0412 19:00:46.084180 1731 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" not found" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:46.149108 kubelet[1731]: I0412 19:00:46.149033 1731 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:46.311319 kubelet[1731]: E0412 19:00:46.311263 1731 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:46.515238 kubelet[1731]: I0412 19:00:46.515175 1731 apiserver.go:52] "Watching apiserver" Apr 12 19:00:46.531581 kubelet[1731]: I0412 19:00:46.531525 1731 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:00:47.963254 kubelet[1731]: W0412 19:00:47.963207 1731 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 19:00:48.563579 systemd[1]: Reloading. Apr 12 19:00:48.717189 /usr/lib/systemd/system-generators/torcx-generator[2023]: time="2024-04-12T19:00:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:00:48.720417 /usr/lib/systemd/system-generators/torcx-generator[2023]: time="2024-04-12T19:00:48Z" level=info msg="torcx already run" Apr 12 19:00:48.815229 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:00:48.815257 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:00:48.839650 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:00:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.952000 audit: BPF prog-id=94 op=LOAD Apr 12 19:00:48.952000 audit: BPF prog-id=55 op=UNLOAD Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.955000 audit: BPF prog-id=95 op=LOAD Apr 12 19:00:48.956000 audit: BPF prog-id=82 op=UNLOAD Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.957000 audit: BPF prog-id=96 op=LOAD Apr 12 19:00:48.957000 audit: BPF prog-id=78 op=UNLOAD Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit: BPF prog-id=97 op=LOAD Apr 12 19:00:48.960000 audit: BPF prog-id=56 op=UNLOAD Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit: BPF prog-id=98 op=LOAD Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.960000 audit: BPF prog-id=99 op=LOAD Apr 12 19:00:48.960000 audit: BPF prog-id=57 op=UNLOAD Apr 12 19:00:48.960000 audit: BPF prog-id=58 op=UNLOAD Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.963000 audit: BPF prog-id=100 op=LOAD Apr 12 19:00:48.963000 audit: BPF prog-id=74 op=UNLOAD Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.964000 audit: BPF prog-id=101 op=LOAD Apr 12 19:00:48.964000 audit: BPF prog-id=59 op=UNLOAD Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit: BPF prog-id=102 op=LOAD Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.965000 audit: BPF prog-id=103 op=LOAD Apr 12 19:00:48.965000 audit: BPF prog-id=60 op=UNLOAD Apr 12 19:00:48.965000 audit: BPF prog-id=61 op=UNLOAD Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit: BPF prog-id=104 op=LOAD Apr 12 19:00:48.968000 audit: BPF prog-id=62 op=UNLOAD Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit: BPF prog-id=105 op=LOAD Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.968000 audit: BPF prog-id=106 op=LOAD Apr 12 19:00:48.968000 audit: BPF prog-id=63 op=UNLOAD Apr 12 19:00:48.968000 audit: BPF prog-id=64 op=UNLOAD Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.970000 audit: BPF prog-id=107 op=LOAD Apr 12 19:00:48.970000 audit: BPF prog-id=65 op=UNLOAD Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit: BPF prog-id=108 op=LOAD Apr 12 19:00:48.972000 audit: BPF prog-id=66 op=UNLOAD Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit: BPF prog-id=109 op=LOAD Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.972000 audit: BPF prog-id=110 op=LOAD Apr 12 19:00:48.972000 audit: BPF prog-id=67 op=UNLOAD Apr 12 19:00:48.972000 audit: BPF prog-id=68 op=UNLOAD Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.974000 audit: BPF prog-id=111 op=LOAD Apr 12 19:00:48.974000 audit: BPF prog-id=70 op=UNLOAD Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.975000 audit: BPF prog-id=112 op=LOAD Apr 12 19:00:48.975000 audit: BPF prog-id=87 op=UNLOAD Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.976000 audit: BPF prog-id=113 op=LOAD Apr 12 19:00:48.976000 audit: BPF prog-id=86 op=UNLOAD Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:48.978000 audit: BPF prog-id=114 op=LOAD Apr 12 19:00:48.978000 audit: BPF prog-id=69 op=UNLOAD Apr 12 19:00:49.009847 systemd[1]: Stopping kubelet.service... Apr 12 19:00:49.029109 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 19:00:49.029403 systemd[1]: Stopped kubelet.service. Apr 12 19:00:49.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:49.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:49.032402 systemd[1]: Started kubelet.service. Apr 12 19:00:49.137321 kubelet[2064]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:00:49.137321 kubelet[2064]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:00:49.137321 kubelet[2064]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:00:49.137321 kubelet[2064]: I0412 19:00:49.133719 2064 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:00:49.143077 kubelet[2064]: I0412 19:00:49.143041 2064 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:00:49.143323 kubelet[2064]: I0412 19:00:49.143304 2064 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:00:49.143844 kubelet[2064]: I0412 19:00:49.143819 2064 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:00:49.146722 kubelet[2064]: I0412 19:00:49.146693 2064 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 19:00:49.153004 kubelet[2064]: I0412 19:00:49.152978 2064 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:00:49.171538 kubelet[2064]: I0412 19:00:49.171479 2064 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:00:49.172330 kubelet[2064]: I0412 19:00:49.172287 2064 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:00:49.173032 kubelet[2064]: I0412 19:00:49.173004 2064 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:00:49.173393 kubelet[2064]: I0412 19:00:49.173373 2064 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:00:49.173645 kubelet[2064]: I0412 19:00:49.173627 2064 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:00:49.173891 kubelet[2064]: I0412 19:00:49.173874 2064 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:00:49.174355 kubelet[2064]: I0412 19:00:49.174338 2064 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:00:49.174664 kubelet[2064]: I0412 19:00:49.174645 2064 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:00:49.174878 kubelet[2064]: I0412 19:00:49.174862 2064 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:00:49.175028 kubelet[2064]: I0412 19:00:49.175012 2064 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:00:49.179645 kubelet[2064]: I0412 19:00:49.179620 2064 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:00:49.180008 kubelet[2064]: I0412 19:00:49.179992 2064 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:00:49.180715 kubelet[2064]: I0412 19:00:49.180697 2064 server.go:1256] "Started kubelet" Apr 12 19:00:49.183000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:49.183000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:49.183000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000743b00 a1=c000a062b8 a2=c000743ad0 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:49.183000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:49.184000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:49.184000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:49.184000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009e56c0 a1=c000a062d0 a2=c000743b90 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:49.184000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:49.186305 kubelet[2064]: I0412 19:00:49.185571 2064 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:00:49.186305 kubelet[2064]: I0412 19:00:49.185630 2064 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:00:49.186305 kubelet[2064]: I0412 19:00:49.185695 2064 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:00:49.192389 kubelet[2064]: I0412 19:00:49.192357 2064 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:00:49.193836 kubelet[2064]: I0412 19:00:49.193806 2064 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:00:49.198503 kubelet[2064]: I0412 19:00:49.197979 2064 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:00:49.198503 kubelet[2064]: I0412 19:00:49.198315 2064 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:00:49.216303 kubelet[2064]: I0412 19:00:49.216274 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:00:49.218252 kubelet[2064]: I0412 19:00:49.218229 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:00:49.218414 kubelet[2064]: I0412 19:00:49.218400 2064 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:00:49.218660 kubelet[2064]: I0412 19:00:49.218625 2064 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:00:49.218844 kubelet[2064]: E0412 19:00:49.218831 2064 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:00:49.219690 kubelet[2064]: I0412 19:00:49.219668 2064 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:00:49.220322 kubelet[2064]: I0412 19:00:49.220301 2064 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:00:49.220718 kubelet[2064]: I0412 19:00:49.220702 2064 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:00:49.233398 kubelet[2064]: I0412 19:00:49.233364 2064 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:00:49.235830 kubelet[2064]: I0412 19:00:49.235798 2064 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:00:49.240358 kubelet[2064]: I0412 19:00:49.240331 2064 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:00:49.285549 kubelet[2064]: E0412 19:00:49.285501 2064 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:00:49.319601 kubelet[2064]: E0412 19:00:49.319556 2064 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 19:00:49.331126 kubelet[2064]: I0412 19:00:49.331073 2064 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.355312 kubelet[2064]: I0412 19:00:49.354953 2064 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.355682 kubelet[2064]: I0412 19:00:49.355660 2064 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.360391 kubelet[2064]: I0412 19:00:49.360363 2064 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:00:49.360907 kubelet[2064]: I0412 19:00:49.360888 2064 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:00:49.361070 kubelet[2064]: I0412 19:00:49.361056 2064 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:00:49.361419 kubelet[2064]: I0412 19:00:49.361401 2064 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 19:00:49.361612 kubelet[2064]: I0412 19:00:49.361585 2064 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 19:00:49.361721 kubelet[2064]: I0412 19:00:49.361706 2064 policy_none.go:49] "None policy: Start" Apr 12 19:00:49.362904 kubelet[2064]: I0412 19:00:49.362884 2064 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:00:49.363039 kubelet[2064]: I0412 19:00:49.363024 2064 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:00:49.363413 kubelet[2064]: I0412 19:00:49.363392 2064 state_mem.go:75] "Updated machine memory state" Apr 12 19:00:49.380809 kubelet[2064]: I0412 19:00:49.380783 2064 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:00:49.379000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:00:49.379000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:00:49.379000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c220f0 a1=c001043b48 a2=c000c220c0 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:00:49.379000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:00:49.381364 kubelet[2064]: I0412 19:00:49.380880 2064 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:00:49.382150 kubelet[2064]: I0412 19:00:49.381830 2064 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:00:49.520013 kubelet[2064]: I0412 19:00:49.519970 2064 topology_manager.go:215] "Topology Admit Handler" podUID="df0cb35802c9ce0b2029ce3547d507f4" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.520630 kubelet[2064]: I0412 19:00:49.520579 2064 topology_manager.go:215] "Topology Admit Handler" podUID="1630a49aa35b54dbc8aa2b2a3067690c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.520901 kubelet[2064]: I0412 19:00:49.520884 2064 topology_manager.go:215] "Topology Admit Handler" podUID="f178f4b6dd13f99b7a972bd8b02a3408" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.525259 kubelet[2064]: I0412 19:00:49.525222 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.525386 kubelet[2064]: I0412 19:00:49.525285 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.525386 kubelet[2064]: I0412 19:00:49.525344 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/df0cb35802c9ce0b2029ce3547d507f4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"df0cb35802c9ce0b2029ce3547d507f4\") " pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.529001 kubelet[2064]: W0412 19:00:49.528971 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 19:00:49.533258 kubelet[2064]: W0412 19:00:49.533225 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 19:00:49.534494 kubelet[2064]: W0412 19:00:49.534467 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 19:00:49.534641 kubelet[2064]: E0412 19:00:49.534576 2064 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626062 kubelet[2064]: I0412 19:00:49.625995 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626302 kubelet[2064]: I0412 19:00:49.626077 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626302 kubelet[2064]: I0412 19:00:49.626183 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f178f4b6dd13f99b7a972bd8b02a3408-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"f178f4b6dd13f99b7a972bd8b02a3408\") " pod="kube-system/kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626606 kubelet[2064]: I0412 19:00:49.626565 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626737 kubelet[2064]: I0412 19:00:49.626714 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:49.626805 kubelet[2064]: I0412 19:00:49.626792 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1630a49aa35b54dbc8aa2b2a3067690c-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" (UID: \"1630a49aa35b54dbc8aa2b2a3067690c\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:50.194560 kubelet[2064]: I0412 19:00:50.194477 2064 apiserver.go:52] "Watching apiserver" Apr 12 19:00:50.221748 kubelet[2064]: I0412 19:00:50.221694 2064 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:00:50.420434 kubelet[2064]: W0412 19:00:50.420388 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 19:00:50.420694 kubelet[2064]: E0412 19:00:50.420529 2064 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:00:50.492344 kubelet[2064]: I0412 19:00:50.492195 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" podStartSLOduration=1.492133517 podStartE2EDuration="1.492133517s" podCreationTimestamp="2024-04-12 19:00:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:00:50.4899713 +0000 UTC m=+1.449545848" watchObservedRunningTime="2024-04-12 19:00:50.492133517 +0000 UTC m=+1.451708060" Apr 12 19:00:50.492344 kubelet[2064]: I0412 19:00:50.492335 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" podStartSLOduration=1.492306344 podStartE2EDuration="1.492306344s" podCreationTimestamp="2024-04-12 19:00:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:00:50.467156596 +0000 UTC m=+1.426731146" watchObservedRunningTime="2024-04-12 19:00:50.492306344 +0000 UTC m=+1.451880893" Apr 12 19:00:50.517441 kubelet[2064]: I0412 19:00:50.517383 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" podStartSLOduration=3.517307806 podStartE2EDuration="3.517307806s" podCreationTimestamp="2024-04-12 19:00:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:00:50.514680819 +0000 UTC m=+1.474255369" watchObservedRunningTime="2024-04-12 19:00:50.517307806 +0000 UTC m=+1.476882356" Apr 12 19:00:51.658463 update_engine[1125]: I0412 19:00:51.657596 1125 update_attempter.cc:509] Updating boot flags... Apr 12 19:00:54.503814 sudo[1348]: pam_unix(sudo:session): session closed for user root Apr 12 19:00:54.503000 audit[1348]: USER_END pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:54.510027 kernel: kauditd_printk_skb: 272 callbacks suppressed Apr 12 19:00:54.510188 kernel: audit: type=1106 audit(1712948454.503:981): pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:54.503000 audit[1348]: CRED_DISP pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:54.558289 kernel: audit: type=1104 audit(1712948454.503:982): pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:00:54.559797 sshd[1345]: pam_unix(sshd:session): session closed for user core Apr 12 19:00:54.561000 audit[1345]: USER_END pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:54.565172 systemd[1]: sshd@6-10.128.0.14:22-139.178.89.65:46618.service: Deactivated successfully. Apr 12 19:00:54.566446 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:00:54.566678 systemd[1]: session-7.scope: Consumed 5.765s CPU time. Apr 12 19:00:54.569864 systemd-logind[1124]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:00:54.571761 systemd-logind[1124]: Removed session 7. Apr 12 19:00:54.561000 audit[1345]: CRED_DISP pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:54.620483 kernel: audit: type=1106 audit(1712948454.561:983): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:54.620656 kernel: audit: type=1104 audit(1712948454.561:984): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:00:54.620729 kernel: audit: type=1131 audit(1712948454.565:985): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.14:22-139.178.89.65:46618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:00:54.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.14:22-139.178.89.65:46618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:00.540000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.540000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1900 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.602102 kernel: audit: type=1400 audit(1712948460.540:986): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.602303 kernel: audit: type=1300 audit(1712948460.540:986): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1900 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.602367 kernel: audit: type=1327 audit(1712948460.540:986): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.540000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.656546 kernel: audit: type=1400 audit(1712948460.546:987): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.656732 kernel: audit: type=1300 audit(1712948460.546:987): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1ac0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1ac0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.719993 kernel: audit: type=1327 audit(1712948460.546:987): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.720147 kernel: audit: type=1400 audit(1712948460.546:988): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1c80 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.781449 kernel: audit: type=1300 audit(1712948460.546:988): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd1c80 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.781663 kernel: audit: type=1327 audit(1712948460.546:988): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:00.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.835663 kernel: audit: type=1400 audit(1712948460.546:989): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:00.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ec90c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:00.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:02.388000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 19:01:02.388000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000959f80 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:02.388000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:04.514891 kubelet[2064]: I0412 19:01:04.514855 2064 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 19:01:04.516906 env[1135]: time="2024-04-12T19:01:04.516828055Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:01:04.517436 kubelet[2064]: I0412 19:01:04.517159 2064 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 19:01:05.206543 kubelet[2064]: I0412 19:01:05.206451 2064 topology_manager.go:215] "Topology Admit Handler" podUID="2174abb1-0cad-4045-b345-97fb116c5812" podNamespace="kube-system" podName="kube-proxy-s7wvc" Apr 12 19:01:05.217353 systemd[1]: Created slice kubepods-besteffort-pod2174abb1_0cad_4045_b345_97fb116c5812.slice. Apr 12 19:01:05.332790 kubelet[2064]: I0412 19:01:05.332721 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2174abb1-0cad-4045-b345-97fb116c5812-xtables-lock\") pod \"kube-proxy-s7wvc\" (UID: \"2174abb1-0cad-4045-b345-97fb116c5812\") " pod="kube-system/kube-proxy-s7wvc" Apr 12 19:01:05.332790 kubelet[2064]: I0412 19:01:05.332790 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2174abb1-0cad-4045-b345-97fb116c5812-lib-modules\") pod \"kube-proxy-s7wvc\" (UID: \"2174abb1-0cad-4045-b345-97fb116c5812\") " pod="kube-system/kube-proxy-s7wvc" Apr 12 19:01:05.333133 kubelet[2064]: I0412 19:01:05.332824 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2174abb1-0cad-4045-b345-97fb116c5812-kube-proxy\") pod \"kube-proxy-s7wvc\" (UID: \"2174abb1-0cad-4045-b345-97fb116c5812\") " pod="kube-system/kube-proxy-s7wvc" Apr 12 19:01:05.333133 kubelet[2064]: I0412 19:01:05.332861 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g4mjz\" (UniqueName: \"kubernetes.io/projected/2174abb1-0cad-4045-b345-97fb116c5812-kube-api-access-g4mjz\") pod \"kube-proxy-s7wvc\" (UID: \"2174abb1-0cad-4045-b345-97fb116c5812\") " pod="kube-system/kube-proxy-s7wvc" Apr 12 19:01:05.528667 env[1135]: time="2024-04-12T19:01:05.527980985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s7wvc,Uid:2174abb1-0cad-4045-b345-97fb116c5812,Namespace:kube-system,Attempt:0,}" Apr 12 19:01:05.556822 kubelet[2064]: I0412 19:01:05.556773 2064 topology_manager.go:215] "Topology Admit Handler" podUID="b375a19f-4b11-42c0-846c-34baca40a1e9" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-jgsm2" Apr 12 19:01:05.564658 env[1135]: time="2024-04-12T19:01:05.564344905Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:05.564658 env[1135]: time="2024-04-12T19:01:05.564448079Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:05.564658 env[1135]: time="2024-04-12T19:01:05.564493813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:05.564981 env[1135]: time="2024-04-12T19:01:05.564833311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4 pid=2162 runtime=io.containerd.runc.v2 Apr 12 19:01:05.567917 systemd[1]: Created slice kubepods-besteffort-podb375a19f_4b11_42c0_846c_34baca40a1e9.slice. Apr 12 19:01:05.605761 systemd[1]: Started cri-containerd-a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4.scope. Apr 12 19:01:05.618704 systemd[1]: run-containerd-runc-k8s.io-a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4-runc.DfvzTr.mount: Deactivated successfully. Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.647347 kernel: kauditd_printk_skb: 5 callbacks suppressed Apr 12 19:01:05.647409 kernel: audit: type=1400 audit(1712948465.641:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.688310 kernel: audit: type=1400 audit(1712948465.641:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.688557 kernel: audit: type=1400 audit(1712948465.641:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731549 kernel: audit: type=1400 audit(1712948465.641:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.754258 kubelet[2064]: I0412 19:01:05.753885 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-524g2\" (UniqueName: \"kubernetes.io/projected/b375a19f-4b11-42c0-846c-34baca40a1e9-kube-api-access-524g2\") pod \"tigera-operator-6bfc79cb9c-jgsm2\" (UID: \"b375a19f-4b11-42c0-846c-34baca40a1e9\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jgsm2" Apr 12 19:01:05.754258 kubelet[2064]: I0412 19:01:05.753967 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b375a19f-4b11-42c0-846c-34baca40a1e9-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-jgsm2\" (UID: \"b375a19f-4b11-42c0-846c-34baca40a1e9\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jgsm2" Apr 12 19:01:05.776134 kernel: audit: type=1400 audit(1712948465.641:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.776231 kernel: audit: type=1400 audit(1712948465.641:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.776273 kernel: audit: type=1400 audit(1712948465.641:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.817972 kernel: audit: type=1400 audit(1712948465.641:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.839501 kernel: audit: type=1400 audit(1712948465.641:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.853782 env[1135]: time="2024-04-12T19:01:05.843297152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s7wvc,Uid:2174abb1-0cad-4045-b345-97fb116c5812,Namespace:kube-system,Attempt:0,} returns sandbox id \"a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4\"" Apr 12 19:01:05.853782 env[1135]: time="2024-04-12T19:01:05.847725276Z" level=info msg="CreateContainer within sandbox \"a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:01:05.862628 kernel: audit: type=1400 audit(1712948465.667:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit: BPF prog-id=115 op=LOAD Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2162 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356135626234643961653432613132653832366230396266396133 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2162 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356135626234643961653432613132653832366230396266396133 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.667000 audit: BPF prog-id=116 op=LOAD Apr 12 19:01:05.667000 audit[2172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000308830 items=0 ppid=2162 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356135626234643961653432613132653832366230396266396133 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.714000 audit: BPF prog-id=117 op=LOAD Apr 12 19:01:05.714000 audit[2172]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308878 items=0 ppid=2162 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356135626234643961653432613132653832366230396266396133 Apr 12 19:01:05.731000 audit: BPF prog-id=117 op=UNLOAD Apr 12 19:01:05.731000 audit: BPF prog-id=116 op=UNLOAD Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { perfmon } for pid=2172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit[2172]: AVC avc: denied { bpf } for pid=2172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.731000 audit: BPF prog-id=118 op=LOAD Apr 12 19:01:05.731000 audit[2172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308c88 items=0 ppid=2162 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356135626234643961653432613132653832366230396266396133 Apr 12 19:01:05.879168 env[1135]: time="2024-04-12T19:01:05.879091163Z" level=info msg="CreateContainer within sandbox \"a35a5bb4d9ae42a12e826b09bf9a3c68b7432d7b0913c50aa879fa6c7f823fd4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c8f0f7461d0092e334f0761f221f83969fe5caf31c8ecbd618fd8b8a10eddbf1\"" Apr 12 19:01:05.882085 env[1135]: time="2024-04-12T19:01:05.880067077Z" level=info msg="StartContainer for \"c8f0f7461d0092e334f0761f221f83969fe5caf31c8ecbd618fd8b8a10eddbf1\"" Apr 12 19:01:05.886096 env[1135]: time="2024-04-12T19:01:05.886049437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jgsm2,Uid:b375a19f-4b11-42c0-846c-34baca40a1e9,Namespace:tigera-operator,Attempt:0,}" Apr 12 19:01:05.923403 systemd[1]: Started cri-containerd-c8f0f7461d0092e334f0761f221f83969fe5caf31c8ecbd618fd8b8a10eddbf1.scope. Apr 12 19:01:05.936457 env[1135]: time="2024-04-12T19:01:05.934273051Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:05.936457 env[1135]: time="2024-04-12T19:01:05.934357622Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:05.936457 env[1135]: time="2024-04-12T19:01:05.934378347Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:05.936457 env[1135]: time="2024-04-12T19:01:05.934672019Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae4c5398e943d07e5769ccdc12c8ca3965d3f6c95a8629616c38c419ad1c0e50 pid=2222 runtime=io.containerd.runc.v2 Apr 12 19:01:05.959182 systemd[1]: Started cri-containerd-ae4c5398e943d07e5769ccdc12c8ca3965d3f6c95a8629616c38c419ad1c0e50.scope. Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6cbccc0448 items=0 ppid=2162 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663066373436316430303932653333346630373631663232316638 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit: BPF prog-id=119 op=LOAD Apr 12 19:01:05.966000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000220ba8 items=0 ppid=2162 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663066373436316430303932653333346630373631663232316638 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit: BPF prog-id=120 op=LOAD Apr 12 19:01:05.966000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220bf8 items=0 ppid=2162 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663066373436316430303932653333346630373631663232316638 Apr 12 19:01:05.966000 audit: BPF prog-id=120 op=UNLOAD Apr 12 19:01:05.966000 audit: BPF prog-id=119 op=UNLOAD Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:05.966000 audit: BPF prog-id=121 op=LOAD Apr 12 19:01:05.966000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220c88 items=0 ppid=2162 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663066373436316430303932653333346630373631663232316638 Apr 12 19:01:06.000421 env[1135]: time="2024-04-12T19:01:06.000344464Z" level=info msg="StartContainer for \"c8f0f7461d0092e334f0761f221f83969fe5caf31c8ecbd618fd8b8a10eddbf1\" returns successfully" Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.014000 audit: BPF prog-id=122 op=LOAD Apr 12 19:01:06.016000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.016000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2222 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165346335333938653934336430376535373639636364633132633863 Apr 12 19:01:06.016000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.016000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2222 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165346335333938653934336430376535373639636364633132633863 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.017000 audit: BPF prog-id=123 op=LOAD Apr 12 19:01:06.017000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025780 items=0 ppid=2222 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165346335333938653934336430376535373639636364633132633863 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.019000 audit: BPF prog-id=124 op=LOAD Apr 12 19:01:06.019000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000257c8 items=0 ppid=2222 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165346335333938653934336430376535373639636364633132633863 Apr 12 19:01:06.020000 audit: BPF prog-id=124 op=UNLOAD Apr 12 19:01:06.020000 audit: BPF prog-id=123 op=UNLOAD Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:06.021000 audit: BPF prog-id=125 op=LOAD Apr 12 19:01:06.021000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025bd8 items=0 ppid=2222 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165346335333938653934336430376535373639636364633132633863 Apr 12 19:01:06.085253 env[1135]: time="2024-04-12T19:01:06.076130619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jgsm2,Uid:b375a19f-4b11-42c0-846c-34baca40a1e9,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ae4c5398e943d07e5769ccdc12c8ca3965d3f6c95a8629616c38c419ad1c0e50\"" Apr 12 19:01:06.085253 env[1135]: time="2024-04-12T19:01:06.078847141Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 19:01:06.142000 audit[2298]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.142000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a940b00 a2=0 a3=7ffe3a940aec items=0 ppid=2233 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:01:06.145000 audit[2299]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.145000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca7184990 a2=0 a3=7ffca718497c items=0 ppid=2233 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:01:06.148000 audit[2300]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.148000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc82836b80 a2=0 a3=7ffc82836b6c items=0 ppid=2233 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:01:06.152000 audit[2301]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.152000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcea3ed4b0 a2=0 a3=7ffcea3ed49c items=0 ppid=2233 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:01:06.154000 audit[2302]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.154000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddeb2f5f0 a2=0 a3=7ffddeb2f5dc items=0 ppid=2233 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:01:06.156000 audit[2303]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.156000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4d7e2c70 a2=0 a3=7fff4d7e2c5c items=0 ppid=2233 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:01:06.246000 audit[2304]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.246000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffec2fa9b10 a2=0 a3=7ffec2fa9afc items=0 ppid=2233 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:01:06.251000 audit[2306]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.251000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc46fa010 a2=0 a3=7ffdc46f9ffc items=0 ppid=2233 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:01:06.257000 audit[2309]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.257000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcf690bd30 a2=0 a3=7ffcf690bd1c items=0 ppid=2233 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:01:06.259000 audit[2310]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.259000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdc1d5c00 a2=0 a3=7fffdc1d5bec items=0 ppid=2233 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:01:06.263000 audit[2312]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.263000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf879b920 a2=0 a3=7ffcf879b90c items=0 ppid=2233 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:01:06.265000 audit[2313]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.265000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5fa92d10 a2=0 a3=7ffc5fa92cfc items=0 ppid=2233 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:01:06.269000 audit[2315]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.269000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc009dffd0 a2=0 a3=7ffc009dffbc items=0 ppid=2233 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:01:06.275000 audit[2318]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.275000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf4244550 a2=0 a3=7ffcf424453c items=0 ppid=2233 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:01:06.280000 audit[2319]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.280000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb3420a0 a2=0 a3=7ffceb34208c items=0 ppid=2233 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:01:06.291000 audit[2321]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.291000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2ea00bb0 a2=0 a3=7fff2ea00b9c items=0 ppid=2233 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:01:06.293000 audit[2322]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.293000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5adb2910 a2=0 a3=7ffc5adb28fc items=0 ppid=2233 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:01:06.298000 audit[2324]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.298000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedc105b10 a2=0 a3=7ffedc105afc items=0 ppid=2233 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:06.305000 audit[2327]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.305000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe98a5b350 a2=0 a3=7ffe98a5b33c items=0 ppid=2233 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:06.311000 audit[2330]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.311000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2b444b70 a2=0 a3=7ffd2b444b5c items=0 ppid=2233 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:01:06.313000 audit[2331]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.313000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7dcdcfc0 a2=0 a3=7ffd7dcdcfac items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:01:06.318000 audit[2333]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.318000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffb30132f0 a2=0 a3=7fffb30132dc items=0 ppid=2233 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:06.323000 audit[2336]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.323000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd93ba9950 a2=0 a3=7ffd93ba993c items=0 ppid=2233 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:06.325000 audit[2337]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.325000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb0f3a6b0 a2=0 a3=7ffeb0f3a69c items=0 ppid=2233 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:01:06.329000 audit[2339]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:06.329000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd80e3ee20 a2=0 a3=7ffd80e3ee0c items=0 ppid=2233 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:01:06.367000 audit[2345]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:06.367000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff8f5d1600 a2=0 a3=7fff8f5d15ec items=0 ppid=2233 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:06.379000 audit[2345]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:06.379000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff8f5d1600 a2=0 a3=7fff8f5d15ec items=0 ppid=2233 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:06.382000 audit[2350]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.382000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdbaf157c0 a2=0 a3=7ffdbaf157ac items=0 ppid=2233 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:01:06.386000 audit[2352]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.386000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4423a600 a2=0 a3=7ffc4423a5ec items=0 ppid=2233 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:01:06.392000 audit[2355]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.392000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeda2a2b40 a2=0 a3=7ffeda2a2b2c items=0 ppid=2233 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:01:06.394000 audit[2356]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.394000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd199fcb10 a2=0 a3=7ffd199fcafc items=0 ppid=2233 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:01:06.398000 audit[2358]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.398000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2d1e5580 a2=0 a3=7ffc2d1e556c items=0 ppid=2233 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:01:06.399000 audit[2359]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.399000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeddb84db0 a2=0 a3=7ffeddb84d9c items=0 ppid=2233 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:01:06.404000 audit[2361]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.404000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe19e6260 a2=0 a3=7fffe19e624c items=0 ppid=2233 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:01:06.413000 audit[2364]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.413000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd3df49c20 a2=0 a3=7ffd3df49c0c items=0 ppid=2233 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:01:06.416000 audit[2365]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.416000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6abc02d0 a2=0 a3=7ffe6abc02bc items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:01:06.423000 audit[2367]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.423000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc09dc6950 a2=0 a3=7ffc09dc693c items=0 ppid=2233 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:01:06.425000 audit[2368]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.425000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedc3cd400 a2=0 a3=7ffedc3cd3ec items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:01:06.430000 audit[2370]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.430000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcac9f4ea0 a2=0 a3=7ffcac9f4e8c items=0 ppid=2233 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:06.436000 audit[2373]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.436000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3b84d2c0 a2=0 a3=7fff3b84d2ac items=0 ppid=2233 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:01:06.442000 audit[2376]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.442000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7c4b27a0 a2=0 a3=7fff7c4b278c items=0 ppid=2233 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:01:06.453000 audit[2377]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.453000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcecf85dd0 a2=0 a3=7ffcecf85dbc items=0 ppid=2233 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:01:06.459000 audit[2379]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.459000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe1b49d7b0 a2=0 a3=7ffe1b49d79c items=0 ppid=2233 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:06.466000 audit[2382]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.466000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcc1414720 a2=0 a3=7ffcc141470c items=0 ppid=2233 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:06.467000 audit[2383]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.467000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd60dcd910 a2=0 a3=7ffd60dcd8fc items=0 ppid=2233 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:01:06.471000 audit[2385]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.471000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffebf578ce0 a2=0 a3=7ffebf578ccc items=0 ppid=2233 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:01:06.473000 audit[2386]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.473000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7d64ad80 a2=0 a3=7ffc7d64ad6c items=0 ppid=2233 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:01:06.476000 audit[2388]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.476000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4aaaa020 a2=0 a3=7fff4aaaa00c items=0 ppid=2233 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:06.481000 audit[2391]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:06.481000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdda94b0f0 a2=0 a3=7ffdda94b0dc items=0 ppid=2233 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:06.486000 audit[2393]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:01:06.486000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc72bbc660 a2=0 a3=7ffc72bbc64c items=0 ppid=2233 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.486000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:06.486000 audit[2393]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:01:06.486000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc72bbc660 a2=0 a3=7ffc72bbc64c items=0 ppid=2233 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:06.486000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:06.881843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2992658044.mount: Deactivated successfully. Apr 12 19:01:08.231213 env[1135]: time="2024-04-12T19:01:08.231148325Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:08.234667 env[1135]: time="2024-04-12T19:01:08.234602462Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:08.237572 env[1135]: time="2024-04-12T19:01:08.237494876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:08.240206 env[1135]: time="2024-04-12T19:01:08.240153174Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:08.241279 env[1135]: time="2024-04-12T19:01:08.241213115Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 19:01:08.247045 env[1135]: time="2024-04-12T19:01:08.246877189Z" level=info msg="CreateContainer within sandbox \"ae4c5398e943d07e5769ccdc12c8ca3965d3f6c95a8629616c38c419ad1c0e50\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 19:01:08.271912 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount964093496.mount: Deactivated successfully. Apr 12 19:01:08.281931 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1626314852.mount: Deactivated successfully. Apr 12 19:01:08.289708 env[1135]: time="2024-04-12T19:01:08.289642330Z" level=info msg="CreateContainer within sandbox \"ae4c5398e943d07e5769ccdc12c8ca3965d3f6c95a8629616c38c419ad1c0e50\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fc7b30e5ab05497cf76195f299802975791cef3fdc8ae7b0c980e19c3c0485d4\"" Apr 12 19:01:08.292476 env[1135]: time="2024-04-12T19:01:08.290619672Z" level=info msg="StartContainer for \"fc7b30e5ab05497cf76195f299802975791cef3fdc8ae7b0c980e19c3c0485d4\"" Apr 12 19:01:08.329189 systemd[1]: Started cri-containerd-fc7b30e5ab05497cf76195f299802975791cef3fdc8ae7b0c980e19c3c0485d4.scope. Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.363000 audit: BPF prog-id=126 op=LOAD Apr 12 19:01:08.364000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.364000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2222 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:08.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663376233306535616230353439376366373631393566323939383032 Apr 12 19:01:08.364000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.364000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2222 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:08.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663376233306535616230353439376366373631393566323939383032 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.365000 audit: BPF prog-id=127 op=LOAD Apr 12 19:01:08.365000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cfee0 items=0 ppid=2222 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:08.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663376233306535616230353439376366373631393566323939383032 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.366000 audit: BPF prog-id=128 op=LOAD Apr 12 19:01:08.366000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cff28 items=0 ppid=2222 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:08.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663376233306535616230353439376366373631393566323939383032 Apr 12 19:01:08.366000 audit: BPF prog-id=128 op=UNLOAD Apr 12 19:01:08.367000 audit: BPF prog-id=127 op=UNLOAD Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:08.367000 audit: BPF prog-id=129 op=LOAD Apr 12 19:01:08.367000 audit[2402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00031a338 items=0 ppid=2222 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:08.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663376233306535616230353439376366373631393566323939383032 Apr 12 19:01:08.398635 env[1135]: time="2024-04-12T19:01:08.398570164Z" level=info msg="StartContainer for \"fc7b30e5ab05497cf76195f299802975791cef3fdc8ae7b0c980e19c3c0485d4\" returns successfully" Apr 12 19:01:09.233080 kubelet[2064]: I0412 19:01:09.233031 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-s7wvc" podStartSLOduration=4.232980477 podStartE2EDuration="4.232980477s" podCreationTimestamp="2024-04-12 19:01:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:01:06.36697141 +0000 UTC m=+17.326545970" watchObservedRunningTime="2024-04-12 19:01:09.232980477 +0000 UTC m=+20.192555029" Apr 12 19:01:10.325000 audit[2435]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:10.325000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc24f7ff40 a2=0 a3=7ffc24f7ff2c items=0 ppid=2233 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:10.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:10.326000 audit[2435]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:10.326000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc24f7ff40 a2=0 a3=0 items=0 ppid=2233 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:10.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:10.335000 audit[2437]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:10.335000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffece2f9cc0 a2=0 a3=7ffece2f9cac items=0 ppid=2233 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:10.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:10.336000 audit[2437]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:10.336000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffece2f9cc0 a2=0 a3=0 items=0 ppid=2233 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:10.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:10.461478 kubelet[2064]: I0412 19:01:10.461426 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-jgsm2" podStartSLOduration=3.297442985 podStartE2EDuration="5.461364114s" podCreationTimestamp="2024-04-12 19:01:05 +0000 UTC" firstStartedPulling="2024-04-12 19:01:06.077878751 +0000 UTC m=+17.037453291" lastFinishedPulling="2024-04-12 19:01:08.24179989 +0000 UTC m=+19.201374420" observedRunningTime="2024-04-12 19:01:09.372412485 +0000 UTC m=+20.331987058" watchObservedRunningTime="2024-04-12 19:01:10.461364114 +0000 UTC m=+21.420938663" Apr 12 19:01:10.462199 kubelet[2064]: I0412 19:01:10.461616 2064 topology_manager.go:215] "Topology Admit Handler" podUID="5eb418c5-d3ca-4507-8b94-81922b78abe1" podNamespace="calico-system" podName="calico-typha-76d975f5d7-gk67t" Apr 12 19:01:10.469981 systemd[1]: Created slice kubepods-besteffort-pod5eb418c5_d3ca_4507_8b94_81922b78abe1.slice. Apr 12 19:01:10.581993 kubelet[2064]: I0412 19:01:10.581848 2064 topology_manager.go:215] "Topology Admit Handler" podUID="0470d41e-ca1c-482f-b106-859ed4cd057f" podNamespace="calico-system" podName="calico-node-lmhjb" Apr 12 19:01:10.591177 systemd[1]: Created slice kubepods-besteffort-pod0470d41e_ca1c_482f_b106_859ed4cd057f.slice. Apr 12 19:01:10.592593 kubelet[2064]: I0412 19:01:10.592225 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pkwkw\" (UniqueName: \"kubernetes.io/projected/5eb418c5-d3ca-4507-8b94-81922b78abe1-kube-api-access-pkwkw\") pod \"calico-typha-76d975f5d7-gk67t\" (UID: \"5eb418c5-d3ca-4507-8b94-81922b78abe1\") " pod="calico-system/calico-typha-76d975f5d7-gk67t" Apr 12 19:01:10.592593 kubelet[2064]: I0412 19:01:10.592286 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5eb418c5-d3ca-4507-8b94-81922b78abe1-tigera-ca-bundle\") pod \"calico-typha-76d975f5d7-gk67t\" (UID: \"5eb418c5-d3ca-4507-8b94-81922b78abe1\") " pod="calico-system/calico-typha-76d975f5d7-gk67t" Apr 12 19:01:10.592593 kubelet[2064]: I0412 19:01:10.592324 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5eb418c5-d3ca-4507-8b94-81922b78abe1-typha-certs\") pod \"calico-typha-76d975f5d7-gk67t\" (UID: \"5eb418c5-d3ca-4507-8b94-81922b78abe1\") " pod="calico-system/calico-typha-76d975f5d7-gk67t" Apr 12 19:01:10.693183 kubelet[2064]: I0412 19:01:10.693116 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0470d41e-ca1c-482f-b106-859ed4cd057f-node-certs\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693183 kubelet[2064]: I0412 19:01:10.693190 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-cni-log-dir\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693495 kubelet[2064]: I0412 19:01:10.693224 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-cni-bin-dir\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693495 kubelet[2064]: I0412 19:01:10.693258 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-var-run-calico\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693495 kubelet[2064]: I0412 19:01:10.693299 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-flexvol-driver-host\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693495 kubelet[2064]: I0412 19:01:10.693359 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-lib-modules\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693495 kubelet[2064]: I0412 19:01:10.693389 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-policysync\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693803 kubelet[2064]: I0412 19:01:10.693428 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-cni-net-dir\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693803 kubelet[2064]: I0412 19:01:10.693483 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-xtables-lock\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693803 kubelet[2064]: I0412 19:01:10.693557 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0470d41e-ca1c-482f-b106-859ed4cd057f-tigera-ca-bundle\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693803 kubelet[2064]: I0412 19:01:10.693595 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0470d41e-ca1c-482f-b106-859ed4cd057f-var-lib-calico\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.693803 kubelet[2064]: I0412 19:01:10.693634 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dg9v4\" (UniqueName: \"kubernetes.io/projected/0470d41e-ca1c-482f-b106-859ed4cd057f-kube-api-access-dg9v4\") pod \"calico-node-lmhjb\" (UID: \"0470d41e-ca1c-482f-b106-859ed4cd057f\") " pod="calico-system/calico-node-lmhjb" Apr 12 19:01:10.712156 kubelet[2064]: I0412 19:01:10.712110 2064 topology_manager.go:215] "Topology Admit Handler" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" podNamespace="calico-system" podName="csi-node-driver-9grsh" Apr 12 19:01:10.712561 kubelet[2064]: E0412 19:01:10.712532 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:10.775740 env[1135]: time="2024-04-12T19:01:10.775670266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76d975f5d7-gk67t,Uid:5eb418c5-d3ca-4507-8b94-81922b78abe1,Namespace:calico-system,Attempt:0,}" Apr 12 19:01:10.798988 kubelet[2064]: I0412 19:01:10.798926 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f2389d86-7c35-4d5a-8e9a-d6d0f6f56391-registration-dir\") pod \"csi-node-driver-9grsh\" (UID: \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\") " pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:10.799273 kubelet[2064]: I0412 19:01:10.799081 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f2389d86-7c35-4d5a-8e9a-d6d0f6f56391-socket-dir\") pod \"csi-node-driver-9grsh\" (UID: \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\") " pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:10.799273 kubelet[2064]: I0412 19:01:10.799203 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8jzv5\" (UniqueName: \"kubernetes.io/projected/f2389d86-7c35-4d5a-8e9a-d6d0f6f56391-kube-api-access-8jzv5\") pod \"csi-node-driver-9grsh\" (UID: \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\") " pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:10.799273 kubelet[2064]: I0412 19:01:10.799245 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f2389d86-7c35-4d5a-8e9a-d6d0f6f56391-varrun\") pod \"csi-node-driver-9grsh\" (UID: \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\") " pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:10.799474 kubelet[2064]: I0412 19:01:10.799281 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f2389d86-7c35-4d5a-8e9a-d6d0f6f56391-kubelet-dir\") pod \"csi-node-driver-9grsh\" (UID: \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\") " pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:10.802780 kubelet[2064]: E0412 19:01:10.802739 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.802780 kubelet[2064]: W0412 19:01:10.802775 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.803027 kubelet[2064]: E0412 19:01:10.802833 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.803221 kubelet[2064]: E0412 19:01:10.803195 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.803221 kubelet[2064]: W0412 19:01:10.803217 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.803414 kubelet[2064]: E0412 19:01:10.803249 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.803620 kubelet[2064]: E0412 19:01:10.803598 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.803620 kubelet[2064]: W0412 19:01:10.803617 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.803820 kubelet[2064]: E0412 19:01:10.803646 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.804021 kubelet[2064]: E0412 19:01:10.803972 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.804021 kubelet[2064]: W0412 19:01:10.803996 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.804196 kubelet[2064]: E0412 19:01:10.804029 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.804400 kubelet[2064]: E0412 19:01:10.804372 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.804400 kubelet[2064]: W0412 19:01:10.804398 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.804595 kubelet[2064]: E0412 19:01:10.804557 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.806686 kubelet[2064]: E0412 19:01:10.806638 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.806686 kubelet[2064]: W0412 19:01:10.806665 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.806908 kubelet[2064]: E0412 19:01:10.806819 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.807080 kubelet[2064]: E0412 19:01:10.807041 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.807080 kubelet[2064]: W0412 19:01:10.807064 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.807231 kubelet[2064]: E0412 19:01:10.807205 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.807453 kubelet[2064]: E0412 19:01:10.807420 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.807453 kubelet[2064]: W0412 19:01:10.807438 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.807667 kubelet[2064]: E0412 19:01:10.807601 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.807857 kubelet[2064]: E0412 19:01:10.807812 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.807857 kubelet[2064]: W0412 19:01:10.807835 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.808039 kubelet[2064]: E0412 19:01:10.807971 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.808229 kubelet[2064]: E0412 19:01:10.808185 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.808229 kubelet[2064]: W0412 19:01:10.808206 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.808404 kubelet[2064]: E0412 19:01:10.808342 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.808618 kubelet[2064]: E0412 19:01:10.808582 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.808618 kubelet[2064]: W0412 19:01:10.808603 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.808803 kubelet[2064]: E0412 19:01:10.808747 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.809020 kubelet[2064]: E0412 19:01:10.808975 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.809020 kubelet[2064]: W0412 19:01:10.808997 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.809194 kubelet[2064]: E0412 19:01:10.809131 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.809370 kubelet[2064]: E0412 19:01:10.809335 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.809370 kubelet[2064]: W0412 19:01:10.809356 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.809539 kubelet[2064]: E0412 19:01:10.809490 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.809757 kubelet[2064]: E0412 19:01:10.809714 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.809757 kubelet[2064]: W0412 19:01:10.809735 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.810387 kubelet[2064]: E0412 19:01:10.810295 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.810607 kubelet[2064]: E0412 19:01:10.810582 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.810607 kubelet[2064]: W0412 19:01:10.810608 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.810783 kubelet[2064]: E0412 19:01:10.810637 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.810990 kubelet[2064]: E0412 19:01:10.810952 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.810990 kubelet[2064]: W0412 19:01:10.810976 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.811178 kubelet[2064]: E0412 19:01:10.811006 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.811435 kubelet[2064]: E0412 19:01:10.811394 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.811435 kubelet[2064]: W0412 19:01:10.811419 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.811617 kubelet[2064]: E0412 19:01:10.811576 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.811831 kubelet[2064]: E0412 19:01:10.811793 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.811831 kubelet[2064]: W0412 19:01:10.811817 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.812029 kubelet[2064]: E0412 19:01:10.811964 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.812191 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.814114 kubelet[2064]: W0412 19:01:10.812209 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.812349 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.812622 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.814114 kubelet[2064]: W0412 19:01:10.812637 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.812807 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.813051 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.814114 kubelet[2064]: W0412 19:01:10.813067 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.813125 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.814114 kubelet[2064]: E0412 19:01:10.813549 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.814776 kubelet[2064]: W0412 19:01:10.813566 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.814776 kubelet[2064]: E0412 19:01:10.813588 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.814776 kubelet[2064]: E0412 19:01:10.813929 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.814776 kubelet[2064]: W0412 19:01:10.813944 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.814776 kubelet[2064]: E0412 19:01:10.813965 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.822839 env[1135]: time="2024-04-12T19:01:10.822721773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:10.824798 env[1135]: time="2024-04-12T19:01:10.822796414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:10.824798 env[1135]: time="2024-04-12T19:01:10.823094439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:10.824798 env[1135]: time="2024-04-12T19:01:10.823343598Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f007a541935f4637e610cc5989089cdd6ef973d2972075c27dbc0ec77d3d486e pid=2470 runtime=io.containerd.runc.v2 Apr 12 19:01:10.848071 kubelet[2064]: E0412 19:01:10.841672 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.848071 kubelet[2064]: W0412 19:01:10.841700 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.848071 kubelet[2064]: E0412 19:01:10.841733 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.860927 kubelet[2064]: E0412 19:01:10.860887 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.860927 kubelet[2064]: W0412 19:01:10.860921 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.861201 kubelet[2064]: E0412 19:01:10.860952 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.899327 systemd[1]: Started cri-containerd-f007a541935f4637e610cc5989089cdd6ef973d2972075c27dbc0ec77d3d486e.scope. Apr 12 19:01:10.902440 kubelet[2064]: E0412 19:01:10.901798 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.902440 kubelet[2064]: W0412 19:01:10.901828 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.902440 kubelet[2064]: E0412 19:01:10.901865 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.902440 kubelet[2064]: E0412 19:01:10.902244 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.902440 kubelet[2064]: W0412 19:01:10.902260 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.902440 kubelet[2064]: E0412 19:01:10.902285 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.903457 kubelet[2064]: E0412 19:01:10.903232 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.903457 kubelet[2064]: W0412 19:01:10.903262 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.903457 kubelet[2064]: E0412 19:01:10.903293 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.903991 kubelet[2064]: E0412 19:01:10.903970 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.904199 kubelet[2064]: W0412 19:01:10.904165 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.904482 kubelet[2064]: E0412 19:01:10.904320 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.904854 kubelet[2064]: E0412 19:01:10.904833 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.905017 kubelet[2064]: W0412 19:01:10.904984 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.905148 kubelet[2064]: E0412 19:01:10.905130 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.905670 kubelet[2064]: E0412 19:01:10.905650 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.905819 kubelet[2064]: W0412 19:01:10.905801 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.905926 kubelet[2064]: E0412 19:01:10.905911 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.906304 kubelet[2064]: E0412 19:01:10.906288 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.906419 kubelet[2064]: W0412 19:01:10.906403 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.906561 kubelet[2064]: E0412 19:01:10.906503 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.906936 kubelet[2064]: E0412 19:01:10.906920 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.907332 kubelet[2064]: W0412 19:01:10.907244 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.908686 kubelet[2064]: E0412 19:01:10.908666 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.909494 env[1135]: time="2024-04-12T19:01:10.909439606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmhjb,Uid:0470d41e-ca1c-482f-b106-859ed4cd057f,Namespace:calico-system,Attempt:0,}" Apr 12 19:01:10.910283 kubelet[2064]: E0412 19:01:10.910259 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.912593 kubelet[2064]: W0412 19:01:10.912570 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.912763 kubelet[2064]: E0412 19:01:10.912746 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.913231 kubelet[2064]: E0412 19:01:10.913214 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.913369 kubelet[2064]: W0412 19:01:10.913350 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.913543 kubelet[2064]: E0412 19:01:10.913500 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.913989 kubelet[2064]: E0412 19:01:10.913968 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.914196 kubelet[2064]: W0412 19:01:10.914170 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.914349 kubelet[2064]: E0412 19:01:10.914333 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.914819 kubelet[2064]: E0412 19:01:10.914798 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.917037 kubelet[2064]: W0412 19:01:10.917005 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.917208 kubelet[2064]: E0412 19:01:10.917189 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.917747 kubelet[2064]: E0412 19:01:10.917726 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.917898 kubelet[2064]: W0412 19:01:10.917877 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.918064 kubelet[2064]: E0412 19:01:10.918038 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.918718 kubelet[2064]: E0412 19:01:10.918695 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.919798 kubelet[2064]: W0412 19:01:10.919768 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.919979 kubelet[2064]: E0412 19:01:10.919960 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.920477 kubelet[2064]: E0412 19:01:10.920454 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.920652 kubelet[2064]: W0412 19:01:10.920630 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.920819 kubelet[2064]: E0412 19:01:10.920800 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.921300 kubelet[2064]: E0412 19:01:10.921273 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.921537 kubelet[2064]: W0412 19:01:10.921481 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.921837 kubelet[2064]: E0412 19:01:10.921813 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.922373 kubelet[2064]: E0412 19:01:10.922351 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.922620 kubelet[2064]: W0412 19:01:10.922596 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.923388 kubelet[2064]: E0412 19:01:10.923345 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.923923 kubelet[2064]: E0412 19:01:10.923901 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.924146 kubelet[2064]: W0412 19:01:10.924112 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.924428 kubelet[2064]: E0412 19:01:10.924405 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.925096 kubelet[2064]: E0412 19:01:10.925074 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.925339 kubelet[2064]: W0412 19:01:10.925303 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.925939 kubelet[2064]: E0412 19:01:10.925898 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.926795 kubelet[2064]: E0412 19:01:10.926775 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.927236 kubelet[2064]: W0412 19:01:10.927207 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.927442 kubelet[2064]: E0412 19:01:10.927423 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.928306 kubelet[2064]: E0412 19:01:10.927967 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.928306 kubelet[2064]: W0412 19:01:10.927985 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.928306 kubelet[2064]: E0412 19:01:10.928030 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.929069 kubelet[2064]: E0412 19:01:10.929047 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.929245 kubelet[2064]: W0412 19:01:10.929222 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.929591 kubelet[2064]: E0412 19:01:10.929566 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.929892 kubelet[2064]: E0412 19:01:10.929874 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.930125 kubelet[2064]: W0412 19:01:10.930100 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.930504 kubelet[2064]: E0412 19:01:10.930483 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.931017 kubelet[2064]: E0412 19:01:10.930978 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.931190 kubelet[2064]: W0412 19:01:10.931166 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.931444 kubelet[2064]: E0412 19:01:10.931425 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.932080 kubelet[2064]: E0412 19:01:10.932059 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.932318 kubelet[2064]: W0412 19:01:10.932231 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.932480 kubelet[2064]: E0412 19:01:10.932460 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:10.964826 kubelet[2064]: E0412 19:01:10.964787 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:10.965103 kubelet[2064]: W0412 19:01:10.965075 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:10.965311 kubelet[2064]: E0412 19:01:10.965288 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:11.001343 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 19:01:11.001578 kernel: audit: type=1400 audit(1712948470.972:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.001825 env[1135]: time="2024-04-12T19:01:11.000470487Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:11.001825 env[1135]: time="2024-04-12T19:01:11.000715863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:11.001825 env[1135]: time="2024-04-12T19:01:11.000830967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:11.001825 env[1135]: time="2024-04-12T19:01:11.001322170Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e pid=2534 runtime=io.containerd.runc.v2 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.036742 kernel: audit: type=1400 audit(1712948470.972:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.064651 kernel: audit: type=1400 audit(1712948470.972:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.086885 kernel: audit: type=1400 audit(1712948470.972:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.081271 systemd[1]: Started cri-containerd-2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e.scope. Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.113839 kernel: audit: type=1400 audit(1712948470.972:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.159269 kernel: audit: type=1400 audit(1712948470.972:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.159443 kernel: audit: type=1400 audit(1712948470.972:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.159535 kernel: audit: type=1400 audit(1712948470.972:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.200828 kernel: audit: type=1400 audit(1712948470.972:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.201019 kernel: audit: type=1400 audit(1712948470.973:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:10.973000 audit: BPF prog-id=130 op=LOAD Apr 12 19:01:11.006000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.006000 audit[2481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2470 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303761353431393335663436333765363130636335393839303839 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2470 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303761353431393335663436333765363130636335393839303839 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit: BPF prog-id=131 op=LOAD Apr 12 19:01:11.007000 audit[2481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000272470 items=0 ppid=2470 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303761353431393335663436333765363130636335393839303839 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit: BPF prog-id=132 op=LOAD Apr 12 19:01:11.007000 audit[2481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002724b8 items=0 ppid=2470 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303761353431393335663436333765363130636335393839303839 Apr 12 19:01:11.007000 audit: BPF prog-id=132 op=UNLOAD Apr 12 19:01:11.007000 audit: BPF prog-id=131 op=UNLOAD Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.007000 audit: BPF prog-id=133 op=LOAD Apr 12 19:01:11.007000 audit[2481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002728c8 items=0 ppid=2470 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303761353431393335663436333765363130636335393839303839 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.279000 audit: BPF prog-id=134 op=LOAD Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2534 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263396535363631636233386666383066623061613232363937386264 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2534 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263396535363631636233386666383066623061613232363937386264 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.281000 audit: BPF prog-id=135 op=LOAD Apr 12 19:01:11.281000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000347ce0 items=0 ppid=2534 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263396535363631636233386666383066623061613232363937386264 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit: BPF prog-id=136 op=LOAD Apr 12 19:01:11.282000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000347d28 items=0 ppid=2534 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263396535363631636233386666383066623061613232363937386264 Apr 12 19:01:11.282000 audit: BPF prog-id=136 op=UNLOAD Apr 12 19:01:11.282000 audit: BPF prog-id=135 op=UNLOAD Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:11.282000 audit: BPF prog-id=137 op=LOAD Apr 12 19:01:11.282000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ae138 items=0 ppid=2534 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263396535363631636233386666383066623061613232363937386264 Apr 12 19:01:11.315143 env[1135]: time="2024-04-12T19:01:11.315083204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76d975f5d7-gk67t,Uid:5eb418c5-d3ca-4507-8b94-81922b78abe1,Namespace:calico-system,Attempt:0,} returns sandbox id \"f007a541935f4637e610cc5989089cdd6ef973d2972075c27dbc0ec77d3d486e\"" Apr 12 19:01:11.320718 env[1135]: time="2024-04-12T19:01:11.320670204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 19:01:11.321778 env[1135]: time="2024-04-12T19:01:11.321659548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmhjb,Uid:0470d41e-ca1c-482f-b106-859ed4cd057f,Namespace:calico-system,Attempt:0,} returns sandbox id \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\"" Apr 12 19:01:11.352000 audit[2575]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:11.352000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee80b1300 a2=0 a3=7ffee80b12ec items=0 ppid=2233 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:11.353000 audit[2575]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:11.353000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee80b1300 a2=0 a3=0 items=0 ppid=2233 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:11.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:12.220822 kubelet[2064]: E0412 19:01:12.220087 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:12.237449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4134172706.mount: Deactivated successfully. Apr 12 19:01:13.985838 env[1135]: time="2024-04-12T19:01:13.985780587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:13.988383 env[1135]: time="2024-04-12T19:01:13.988335961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:13.991330 env[1135]: time="2024-04-12T19:01:13.991286127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:13.994222 env[1135]: time="2024-04-12T19:01:13.994178483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:13.995573 env[1135]: time="2024-04-12T19:01:13.995497058Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 19:01:14.001578 env[1135]: time="2024-04-12T19:01:13.999882745Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:01:14.024571 env[1135]: time="2024-04-12T19:01:14.022230138Z" level=info msg="CreateContainer within sandbox \"f007a541935f4637e610cc5989089cdd6ef973d2972075c27dbc0ec77d3d486e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 19:01:14.043274 env[1135]: time="2024-04-12T19:01:14.043219551Z" level=info msg="CreateContainer within sandbox \"f007a541935f4637e610cc5989089cdd6ef973d2972075c27dbc0ec77d3d486e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0861e42d254013daf4dcbb191520fae5f05e79af9d6ed4b61aef7388a23dcc35\"" Apr 12 19:01:14.044362 env[1135]: time="2024-04-12T19:01:14.044311806Z" level=info msg="StartContainer for \"0861e42d254013daf4dcbb191520fae5f05e79af9d6ed4b61aef7388a23dcc35\"" Apr 12 19:01:14.091743 systemd[1]: Started cri-containerd-0861e42d254013daf4dcbb191520fae5f05e79af9d6ed4b61aef7388a23dcc35.scope. Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.142000 audit: BPF prog-id=138 op=LOAD Apr 12 19:01:14.145000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.145000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2470 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:14.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363165343264323534303133646166346463626231393135323066 Apr 12 19:01:14.145000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.145000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2470 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:14.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363165343264323534303133646166346463626231393135323066 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.146000 audit: BPF prog-id=139 op=LOAD Apr 12 19:01:14.146000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032bd20 items=0 ppid=2470 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:14.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363165343264323534303133646166346463626231393135323066 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.147000 audit: BPF prog-id=140 op=LOAD Apr 12 19:01:14.147000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032bd68 items=0 ppid=2470 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:14.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363165343264323534303133646166346463626231393135323066 Apr 12 19:01:14.148000 audit: BPF prog-id=140 op=UNLOAD Apr 12 19:01:14.148000 audit: BPF prog-id=139 op=UNLOAD Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:14.148000 audit: BPF prog-id=141 op=LOAD Apr 12 19:01:14.148000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000394178 items=0 ppid=2470 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:14.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363165343264323534303133646166346463626231393135323066 Apr 12 19:01:14.220147 kubelet[2064]: E0412 19:01:14.219671 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:14.226860 env[1135]: time="2024-04-12T19:01:14.226800133Z" level=info msg="StartContainer for \"0861e42d254013daf4dcbb191520fae5f05e79af9d6ed4b61aef7388a23dcc35\" returns successfully" Apr 12 19:01:14.418424 kubelet[2064]: I0412 19:01:14.418378 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-76d975f5d7-gk67t" podStartSLOduration=1.737062213 podStartE2EDuration="4.418294821s" podCreationTimestamp="2024-04-12 19:01:10 +0000 UTC" firstStartedPulling="2024-04-12 19:01:11.317089247 +0000 UTC m=+22.276663776" lastFinishedPulling="2024-04-12 19:01:13.998321859 +0000 UTC m=+24.957896384" observedRunningTime="2024-04-12 19:01:14.415987206 +0000 UTC m=+25.375561785" watchObservedRunningTime="2024-04-12 19:01:14.418294821 +0000 UTC m=+25.377869375" Apr 12 19:01:14.459921 kubelet[2064]: E0412 19:01:14.459853 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.459921 kubelet[2064]: W0412 19:01:14.459915 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.460272 kubelet[2064]: E0412 19:01:14.459980 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.461402 kubelet[2064]: E0412 19:01:14.461374 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.461402 kubelet[2064]: W0412 19:01:14.461398 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.461690 kubelet[2064]: E0412 19:01:14.461425 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.462135 kubelet[2064]: E0412 19:01:14.462059 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.462135 kubelet[2064]: W0412 19:01:14.462098 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.462135 kubelet[2064]: E0412 19:01:14.462122 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.462621 kubelet[2064]: E0412 19:01:14.462602 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.462790 kubelet[2064]: W0412 19:01:14.462767 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.463025 kubelet[2064]: E0412 19:01:14.463005 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.463618 kubelet[2064]: E0412 19:01:14.463598 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.463786 kubelet[2064]: W0412 19:01:14.463764 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.463915 kubelet[2064]: E0412 19:01:14.463898 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.464346 kubelet[2064]: E0412 19:01:14.464328 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.464502 kubelet[2064]: W0412 19:01:14.464481 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.464685 kubelet[2064]: E0412 19:01:14.464667 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.465111 kubelet[2064]: E0412 19:01:14.465092 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.465245 kubelet[2064]: W0412 19:01:14.465225 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.465360 kubelet[2064]: E0412 19:01:14.465344 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.465870 kubelet[2064]: E0412 19:01:14.465851 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.465996 kubelet[2064]: W0412 19:01:14.465976 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.466202 kubelet[2064]: E0412 19:01:14.466183 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.466700 kubelet[2064]: E0412 19:01:14.466680 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.466875 kubelet[2064]: W0412 19:01:14.466852 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.467005 kubelet[2064]: E0412 19:01:14.466987 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.467497 kubelet[2064]: E0412 19:01:14.467479 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.467691 kubelet[2064]: W0412 19:01:14.467660 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.467807 kubelet[2064]: E0412 19:01:14.467695 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.468005 kubelet[2064]: E0412 19:01:14.467988 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.468159 kubelet[2064]: W0412 19:01:14.468138 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.468297 kubelet[2064]: E0412 19:01:14.468280 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.468740 kubelet[2064]: E0412 19:01:14.468718 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.468740 kubelet[2064]: W0412 19:01:14.468736 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.468901 kubelet[2064]: E0412 19:01:14.468759 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.469221 kubelet[2064]: E0412 19:01:14.469170 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.469221 kubelet[2064]: W0412 19:01:14.469194 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.469221 kubelet[2064]: E0412 19:01:14.469215 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.469698 kubelet[2064]: E0412 19:01:14.469653 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.469698 kubelet[2064]: W0412 19:01:14.469671 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.469698 kubelet[2064]: E0412 19:01:14.469720 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.470156 kubelet[2064]: E0412 19:01:14.470132 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.470156 kubelet[2064]: W0412 19:01:14.470151 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.470322 kubelet[2064]: E0412 19:01:14.470178 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.533725 kubelet[2064]: E0412 19:01:14.533683 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.533725 kubelet[2064]: W0412 19:01:14.533715 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.534038 kubelet[2064]: E0412 19:01:14.533749 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.534416 kubelet[2064]: E0412 19:01:14.534388 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.534416 kubelet[2064]: W0412 19:01:14.534410 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.534980 kubelet[2064]: E0412 19:01:14.534444 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.534980 kubelet[2064]: E0412 19:01:14.534865 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.534980 kubelet[2064]: W0412 19:01:14.534881 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.534980 kubelet[2064]: E0412 19:01:14.534910 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.535572 kubelet[2064]: E0412 19:01:14.535549 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.535572 kubelet[2064]: W0412 19:01:14.535568 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.535746 kubelet[2064]: E0412 19:01:14.535674 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.536533 kubelet[2064]: E0412 19:01:14.536485 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.536533 kubelet[2064]: W0412 19:01:14.536531 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.536700 kubelet[2064]: E0412 19:01:14.536636 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.537006 kubelet[2064]: E0412 19:01:14.536985 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.537006 kubelet[2064]: W0412 19:01:14.537004 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.537164 kubelet[2064]: E0412 19:01:14.537107 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.537458 kubelet[2064]: E0412 19:01:14.537438 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.537458 kubelet[2064]: W0412 19:01:14.537456 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.537724 kubelet[2064]: E0412 19:01:14.537549 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.538007 kubelet[2064]: E0412 19:01:14.537986 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.538007 kubelet[2064]: W0412 19:01:14.538004 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.538234 kubelet[2064]: E0412 19:01:14.538044 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.538610 kubelet[2064]: E0412 19:01:14.538587 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.538701 kubelet[2064]: W0412 19:01:14.538614 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.538701 kubelet[2064]: E0412 19:01:14.538656 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.539097 kubelet[2064]: E0412 19:01:14.539077 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.539097 kubelet[2064]: W0412 19:01:14.539094 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.539264 kubelet[2064]: E0412 19:01:14.539204 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.539839 kubelet[2064]: E0412 19:01:14.539817 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.539974 kubelet[2064]: W0412 19:01:14.539842 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.540129 kubelet[2064]: E0412 19:01:14.540098 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.540485 kubelet[2064]: E0412 19:01:14.540466 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.540740 kubelet[2064]: W0412 19:01:14.540640 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.540939 kubelet[2064]: E0412 19:01:14.540914 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.541233 kubelet[2064]: E0412 19:01:14.541212 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.541233 kubelet[2064]: W0412 19:01:14.541230 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.541477 kubelet[2064]: E0412 19:01:14.541457 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.541845 kubelet[2064]: E0412 19:01:14.541825 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.541845 kubelet[2064]: W0412 19:01:14.541842 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.542066 kubelet[2064]: E0412 19:01:14.542027 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.542314 kubelet[2064]: E0412 19:01:14.542294 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.542314 kubelet[2064]: W0412 19:01:14.542311 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.542469 kubelet[2064]: E0412 19:01:14.542338 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.542907 kubelet[2064]: E0412 19:01:14.542887 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.543063 kubelet[2064]: W0412 19:01:14.543015 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.543063 kubelet[2064]: E0412 19:01:14.543060 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.543638 kubelet[2064]: E0412 19:01:14.543617 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.543638 kubelet[2064]: W0412 19:01:14.543635 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.543807 kubelet[2064]: E0412 19:01:14.543662 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:14.544009 kubelet[2064]: E0412 19:01:14.543988 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:14.544009 kubelet[2064]: W0412 19:01:14.544006 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:14.544145 kubelet[2064]: E0412 19:01:14.544026 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.396446 kubelet[2064]: I0412 19:01:15.396401 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:01:15.477062 kubelet[2064]: E0412 19:01:15.477022 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.477062 kubelet[2064]: W0412 19:01:15.477055 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.477363 kubelet[2064]: E0412 19:01:15.477111 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.477813 kubelet[2064]: E0412 19:01:15.477769 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.477813 kubelet[2064]: W0412 19:01:15.477811 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.477990 kubelet[2064]: E0412 19:01:15.477835 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.478241 kubelet[2064]: E0412 19:01:15.478219 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.478347 kubelet[2064]: W0412 19:01:15.478246 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.478347 kubelet[2064]: E0412 19:01:15.478268 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.478673 kubelet[2064]: E0412 19:01:15.478651 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.478755 kubelet[2064]: W0412 19:01:15.478679 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.478755 kubelet[2064]: E0412 19:01:15.478699 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.479068 kubelet[2064]: E0412 19:01:15.479048 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.479158 kubelet[2064]: W0412 19:01:15.479077 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.479158 kubelet[2064]: E0412 19:01:15.479097 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.479431 kubelet[2064]: E0412 19:01:15.479411 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.479431 kubelet[2064]: W0412 19:01:15.479430 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.479569 kubelet[2064]: E0412 19:01:15.479449 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.479884 kubelet[2064]: E0412 19:01:15.479864 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.479996 kubelet[2064]: W0412 19:01:15.479884 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.479996 kubelet[2064]: E0412 19:01:15.479931 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.480398 kubelet[2064]: E0412 19:01:15.480376 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.480398 kubelet[2064]: W0412 19:01:15.480397 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.480590 kubelet[2064]: E0412 19:01:15.480417 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.480930 kubelet[2064]: E0412 19:01:15.480901 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.480930 kubelet[2064]: W0412 19:01:15.480929 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.481070 kubelet[2064]: E0412 19:01:15.480952 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.481459 kubelet[2064]: E0412 19:01:15.481438 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.481459 kubelet[2064]: W0412 19:01:15.481458 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.481675 kubelet[2064]: E0412 19:01:15.481492 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.481990 kubelet[2064]: E0412 19:01:15.481968 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.482083 kubelet[2064]: W0412 19:01:15.482015 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.482083 kubelet[2064]: E0412 19:01:15.482037 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.482394 kubelet[2064]: E0412 19:01:15.482372 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.482474 kubelet[2064]: W0412 19:01:15.482396 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.482474 kubelet[2064]: E0412 19:01:15.482449 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.482896 kubelet[2064]: E0412 19:01:15.482873 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.482896 kubelet[2064]: W0412 19:01:15.482895 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.483046 kubelet[2064]: E0412 19:01:15.482914 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.483256 kubelet[2064]: E0412 19:01:15.483235 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.483256 kubelet[2064]: W0412 19:01:15.483255 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.483388 kubelet[2064]: E0412 19:01:15.483305 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.483810 kubelet[2064]: E0412 19:01:15.483771 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.483810 kubelet[2064]: W0412 19:01:15.483808 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.483964 kubelet[2064]: E0412 19:01:15.483883 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.544012 kubelet[2064]: E0412 19:01:15.543909 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.544012 kubelet[2064]: W0412 19:01:15.543953 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.544012 kubelet[2064]: E0412 19:01:15.543985 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.544429 kubelet[2064]: E0412 19:01:15.544406 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.544429 kubelet[2064]: W0412 19:01:15.544429 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.544599 kubelet[2064]: E0412 19:01:15.544458 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.544899 kubelet[2064]: E0412 19:01:15.544875 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.544899 kubelet[2064]: W0412 19:01:15.544897 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.545134 kubelet[2064]: E0412 19:01:15.544923 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.545303 kubelet[2064]: E0412 19:01:15.545282 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.545385 kubelet[2064]: W0412 19:01:15.545304 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.545385 kubelet[2064]: E0412 19:01:15.545331 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.545698 kubelet[2064]: E0412 19:01:15.545676 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.545698 kubelet[2064]: W0412 19:01:15.545697 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.545848 kubelet[2064]: E0412 19:01:15.545835 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.546046 kubelet[2064]: E0412 19:01:15.546027 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.546046 kubelet[2064]: W0412 19:01:15.546045 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.546594 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.546843 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.548607 kubelet[2064]: W0412 19:01:15.546857 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.546984 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.547183 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.548607 kubelet[2064]: W0412 19:01:15.547195 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.547285 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.547652 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.548607 kubelet[2064]: W0412 19:01:15.547665 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.548607 kubelet[2064]: E0412 19:01:15.547694 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.547992 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.550656 kubelet[2064]: W0412 19:01:15.548004 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.548028 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.548445 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.550656 kubelet[2064]: W0412 19:01:15.548460 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.548614 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.549053 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.550656 kubelet[2064]: W0412 19:01:15.549068 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.549198 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.550656 kubelet[2064]: E0412 19:01:15.549394 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.553986 kubelet[2064]: W0412 19:01:15.549406 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.549706 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.550362 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.553986 kubelet[2064]: W0412 19:01:15.550377 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.550403 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.551390 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.553986 kubelet[2064]: W0412 19:01:15.551405 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.551433 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.553986 kubelet[2064]: E0412 19:01:15.551845 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.553986 kubelet[2064]: W0412 19:01:15.551860 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.554552 kubelet[2064]: E0412 19:01:15.551981 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.554552 kubelet[2064]: E0412 19:01:15.552452 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.554552 kubelet[2064]: W0412 19:01:15.552467 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.554552 kubelet[2064]: E0412 19:01:15.552494 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.554552 kubelet[2064]: E0412 19:01:15.552993 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:15.554552 kubelet[2064]: W0412 19:01:15.553007 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:15.554552 kubelet[2064]: E0412 19:01:15.553030 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:15.629333 env[1135]: time="2024-04-12T19:01:15.629262906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:15.632377 env[1135]: time="2024-04-12T19:01:15.632298029Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:15.635101 env[1135]: time="2024-04-12T19:01:15.635057154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:15.637638 env[1135]: time="2024-04-12T19:01:15.637590390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:15.639062 env[1135]: time="2024-04-12T19:01:15.638998078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 19:01:15.643952 env[1135]: time="2024-04-12T19:01:15.643897798Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:01:15.665953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount970236534.mount: Deactivated successfully. Apr 12 19:01:15.671890 env[1135]: time="2024-04-12T19:01:15.671833487Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf\"" Apr 12 19:01:15.673009 env[1135]: time="2024-04-12T19:01:15.672969136Z" level=info msg="StartContainer for \"b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf\"" Apr 12 19:01:15.724726 systemd[1]: Started cri-containerd-b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf.scope. Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f51901a4be8 items=0 ppid=2534 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:15.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396333363431646664373561646664376639356237633564613835 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.773000 audit: BPF prog-id=142 op=LOAD Apr 12 19:01:15.773000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c9b98 items=0 ppid=2534 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:15.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396333363431646664373561646664376639356237633564613835 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit: BPF prog-id=143 op=LOAD Apr 12 19:01:15.774000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c9be8 items=0 ppid=2534 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:15.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396333363431646664373561646664376639356237633564613835 Apr 12 19:01:15.774000 audit: BPF prog-id=143 op=UNLOAD Apr 12 19:01:15.774000 audit: BPF prog-id=142 op=UNLOAD Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:15.774000 audit: BPF prog-id=144 op=LOAD Apr 12 19:01:15.774000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c9c78 items=0 ppid=2534 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:15.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396333363431646664373561646664376639356237633564613835 Apr 12 19:01:15.804804 env[1135]: time="2024-04-12T19:01:15.804715748Z" level=info msg="StartContainer for \"b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf\" returns successfully" Apr 12 19:01:15.835753 systemd[1]: cri-containerd-b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf.scope: Deactivated successfully. Apr 12 19:01:15.838000 audit: BPF prog-id=144 op=UNLOAD Apr 12 19:01:16.008553 systemd[1]: run-containerd-runc-k8s.io-b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf-runc.2QQkTe.mount: Deactivated successfully. Apr 12 19:01:16.009114 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf-rootfs.mount: Deactivated successfully. Apr 12 19:01:16.219417 kubelet[2064]: E0412 19:01:16.219352 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:16.464852 env[1135]: time="2024-04-12T19:01:16.464669380Z" level=info msg="shim disconnected" id=b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf Apr 12 19:01:16.464852 env[1135]: time="2024-04-12T19:01:16.464754064Z" level=warning msg="cleaning up after shim disconnected" id=b09c3641dfd75adfd7f95b7c5da854543cdca1943f0eb3fdb9c5c1dd3aa15adf namespace=k8s.io Apr 12 19:01:16.464852 env[1135]: time="2024-04-12T19:01:16.464769748Z" level=info msg="cleaning up dead shim" Apr 12 19:01:16.485103 env[1135]: time="2024-04-12T19:01:16.485031711Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:01:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2727 runtime=io.containerd.runc.v2\n" Apr 12 19:01:17.406035 env[1135]: time="2024-04-12T19:01:17.405979918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:01:18.200673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount195573468.mount: Deactivated successfully. Apr 12 19:01:18.219903 kubelet[2064]: E0412 19:01:18.219839 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:20.219889 kubelet[2064]: E0412 19:01:20.219840 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:22.215315 env[1135]: time="2024-04-12T19:01:22.215239645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:22.218649 env[1135]: time="2024-04-12T19:01:22.218597578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:22.219743 kubelet[2064]: E0412 19:01:22.219703 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:22.224166 env[1135]: time="2024-04-12T19:01:22.224112114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:22.228144 env[1135]: time="2024-04-12T19:01:22.228099902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:22.229213 env[1135]: time="2024-04-12T19:01:22.229158817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 19:01:22.233853 env[1135]: time="2024-04-12T19:01:22.233166010Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:01:22.253581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount829475701.mount: Deactivated successfully. Apr 12 19:01:22.259066 env[1135]: time="2024-04-12T19:01:22.259008408Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06\"" Apr 12 19:01:22.260649 env[1135]: time="2024-04-12T19:01:22.260603902Z" level=info msg="StartContainer for \"3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06\"" Apr 12 19:01:22.311382 systemd[1]: Started cri-containerd-3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06.scope. Apr 12 19:01:22.370360 kernel: kauditd_printk_skb: 211 callbacks suppressed Apr 12 19:01:22.370649 kernel: audit: type=1400 audit(1712948482.342:1169): avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fedee62abd8 items=0 ppid=2534 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:22.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313633323234386363383833333537376231666330623933613032 Apr 12 19:01:22.435171 kernel: audit: type=1300 audit(1712948482.342:1169): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fedee62abd8 items=0 ppid=2534 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:22.435372 kernel: audit: type=1327 audit(1712948482.342:1169): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313633323234386363383833333537376231666330623933613032 Apr 12 19:01:22.435416 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.481731 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.505078 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.527607 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.543808 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.544955 env[1135]: time="2024-04-12T19:01:22.544882108Z" level=info msg="StartContainer for \"3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06\" returns successfully" Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.594636 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.594857 kernel: audit: type=1400 audit(1712948482.342:1170): avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.342000 audit: BPF prog-id=145 op=LOAD Apr 12 19:01:22.342000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0a88 items=0 ppid=2534 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:22.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313633323234386363383833333537376231666330623933613032 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.406000 audit: BPF prog-id=146 op=LOAD Apr 12 19:01:22.406000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0ad8 items=0 ppid=2534 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:22.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313633323234386363383833333537376231666330623933613032 Apr 12 19:01:22.453000 audit: BPF prog-id=146 op=UNLOAD Apr 12 19:01:22.453000 audit: BPF prog-id=145 op=UNLOAD Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:22.453000 audit: BPF prog-id=147 op=LOAD Apr 12 19:01:22.453000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0b68 items=0 ppid=2534 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:22.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313633323234386363383833333537376231666330623933613032 Apr 12 19:01:23.354381 env[1135]: time="2024-04-12T19:01:23.354222108Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:01:23.357357 systemd[1]: cri-containerd-3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06.scope: Deactivated successfully. Apr 12 19:01:23.362000 audit: BPF prog-id=147 op=UNLOAD Apr 12 19:01:23.387388 kubelet[2064]: I0412 19:01:23.386601 2064 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 19:01:23.408043 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06-rootfs.mount: Deactivated successfully. Apr 12 19:01:23.427784 kubelet[2064]: I0412 19:01:23.427738 2064 topology_manager.go:215] "Topology Admit Handler" podUID="0da3af74-cfa5-44c0-b14a-620fc886fa93" podNamespace="kube-system" podName="coredns-76f75df574-9rjch" Apr 12 19:01:23.440252 kubelet[2064]: I0412 19:01:23.440205 2064 topology_manager.go:215] "Topology Admit Handler" podUID="d4fb8ca4-5089-4763-867c-0feae5c722e4" podNamespace="kube-system" podName="coredns-76f75df574-kt8d8" Apr 12 19:01:23.441935 systemd[1]: Created slice kubepods-burstable-pod0da3af74_cfa5_44c0_b14a_620fc886fa93.slice. Apr 12 19:01:23.454442 kubelet[2064]: I0412 19:01:23.454390 2064 topology_manager.go:215] "Topology Admit Handler" podUID="3634e9ed-6def-4574-bb6c-0144a963d7b1" podNamespace="calico-system" podName="calico-kube-controllers-65c69bc647-v6x6p" Apr 12 19:01:23.460778 systemd[1]: Created slice kubepods-burstable-podd4fb8ca4_5089_4763_867c_0feae5c722e4.slice. Apr 12 19:01:23.483838 systemd[1]: Created slice kubepods-besteffort-pod3634e9ed_6def_4574_bb6c_0144a963d7b1.slice. Apr 12 19:01:23.515972 kubelet[2064]: I0412 19:01:23.515845 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0da3af74-cfa5-44c0-b14a-620fc886fa93-config-volume\") pod \"coredns-76f75df574-9rjch\" (UID: \"0da3af74-cfa5-44c0-b14a-620fc886fa93\") " pod="kube-system/coredns-76f75df574-9rjch" Apr 12 19:01:23.516228 kubelet[2064]: I0412 19:01:23.516028 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3634e9ed-6def-4574-bb6c-0144a963d7b1-tigera-ca-bundle\") pod \"calico-kube-controllers-65c69bc647-v6x6p\" (UID: \"3634e9ed-6def-4574-bb6c-0144a963d7b1\") " pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" Apr 12 19:01:23.516228 kubelet[2064]: I0412 19:01:23.516143 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d4fb8ca4-5089-4763-867c-0feae5c722e4-config-volume\") pod \"coredns-76f75df574-kt8d8\" (UID: \"d4fb8ca4-5089-4763-867c-0feae5c722e4\") " pod="kube-system/coredns-76f75df574-kt8d8" Apr 12 19:01:23.516228 kubelet[2064]: I0412 19:01:23.516230 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjqqv\" (UniqueName: \"kubernetes.io/projected/3634e9ed-6def-4574-bb6c-0144a963d7b1-kube-api-access-tjqqv\") pod \"calico-kube-controllers-65c69bc647-v6x6p\" (UID: \"3634e9ed-6def-4574-bb6c-0144a963d7b1\") " pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" Apr 12 19:01:23.516462 kubelet[2064]: I0412 19:01:23.516267 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qjm9b\" (UniqueName: \"kubernetes.io/projected/d4fb8ca4-5089-4763-867c-0feae5c722e4-kube-api-access-qjm9b\") pod \"coredns-76f75df574-kt8d8\" (UID: \"d4fb8ca4-5089-4763-867c-0feae5c722e4\") " pod="kube-system/coredns-76f75df574-kt8d8" Apr 12 19:01:23.516462 kubelet[2064]: I0412 19:01:23.516410 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qmhh7\" (UniqueName: \"kubernetes.io/projected/0da3af74-cfa5-44c0-b14a-620fc886fa93-kube-api-access-qmhh7\") pod \"coredns-76f75df574-9rjch\" (UID: \"0da3af74-cfa5-44c0-b14a-620fc886fa93\") " pod="kube-system/coredns-76f75df574-9rjch" Apr 12 19:01:23.748707 env[1135]: time="2024-04-12T19:01:23.748635075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9rjch,Uid:0da3af74-cfa5-44c0-b14a-620fc886fa93,Namespace:kube-system,Attempt:0,}" Apr 12 19:01:23.770663 env[1135]: time="2024-04-12T19:01:23.770598502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-kt8d8,Uid:d4fb8ca4-5089-4763-867c-0feae5c722e4,Namespace:kube-system,Attempt:0,}" Apr 12 19:01:23.790842 env[1135]: time="2024-04-12T19:01:23.790771599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c69bc647-v6x6p,Uid:3634e9ed-6def-4574-bb6c-0144a963d7b1,Namespace:calico-system,Attempt:0,}" Apr 12 19:01:24.120082 env[1135]: time="2024-04-12T19:01:24.119464064Z" level=info msg="shim disconnected" id=3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06 Apr 12 19:01:24.120082 env[1135]: time="2024-04-12T19:01:24.119586668Z" level=warning msg="cleaning up after shim disconnected" id=3a1632248cc8833577b1fc0b93a027ea8681e1c84ae9be6ec7e1ad0622212a06 namespace=k8s.io Apr 12 19:01:24.120082 env[1135]: time="2024-04-12T19:01:24.119643782Z" level=info msg="cleaning up dead shim" Apr 12 19:01:24.145039 env[1135]: time="2024-04-12T19:01:24.144965352Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:01:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2796 runtime=io.containerd.runc.v2\n" Apr 12 19:01:24.227254 systemd[1]: Created slice kubepods-besteffort-podf2389d86_7c35_4d5a_8e9a_d6d0f6f56391.slice. Apr 12 19:01:24.232763 env[1135]: time="2024-04-12T19:01:24.232704034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grsh,Uid:f2389d86-7c35-4d5a-8e9a-d6d0f6f56391,Namespace:calico-system,Attempt:0,}" Apr 12 19:01:24.308890 env[1135]: time="2024-04-12T19:01:24.308735718Z" level=error msg="Failed to destroy network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.309748 env[1135]: time="2024-04-12T19:01:24.309680124Z" level=error msg="encountered an error cleaning up failed sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.310104 env[1135]: time="2024-04-12T19:01:24.310051347Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-kt8d8,Uid:d4fb8ca4-5089-4763-867c-0feae5c722e4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.310885 kubelet[2064]: E0412 19:01:24.310636 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.310885 kubelet[2064]: E0412 19:01:24.310724 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-kt8d8" Apr 12 19:01:24.310885 kubelet[2064]: E0412 19:01:24.310761 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-kt8d8" Apr 12 19:01:24.311653 kubelet[2064]: E0412 19:01:24.311602 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-kt8d8_kube-system(d4fb8ca4-5089-4763-867c-0feae5c722e4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-kt8d8_kube-system(d4fb8ca4-5089-4763-867c-0feae5c722e4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-kt8d8" podUID="d4fb8ca4-5089-4763-867c-0feae5c722e4" Apr 12 19:01:24.385107 env[1135]: time="2024-04-12T19:01:24.383938195Z" level=error msg="Failed to destroy network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.386439 env[1135]: time="2024-04-12T19:01:24.386331385Z" level=error msg="encountered an error cleaning up failed sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.386783 env[1135]: time="2024-04-12T19:01:24.386729241Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9rjch,Uid:0da3af74-cfa5-44c0-b14a-620fc886fa93,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.387236 env[1135]: time="2024-04-12T19:01:24.387077938Z" level=error msg="Failed to destroy network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.388301 kubelet[2064]: E0412 19:01:24.387662 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.388301 kubelet[2064]: E0412 19:01:24.387754 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9rjch" Apr 12 19:01:24.388301 kubelet[2064]: E0412 19:01:24.387809 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9rjch" Apr 12 19:01:24.388899 kubelet[2064]: E0412 19:01:24.387909 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-9rjch_kube-system(0da3af74-cfa5-44c0-b14a-620fc886fa93)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-9rjch_kube-system(0da3af74-cfa5-44c0-b14a-620fc886fa93)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9rjch" podUID="0da3af74-cfa5-44c0-b14a-620fc886fa93" Apr 12 19:01:24.389686 env[1135]: time="2024-04-12T19:01:24.389614230Z" level=error msg="encountered an error cleaning up failed sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.389904 env[1135]: time="2024-04-12T19:01:24.389857285Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c69bc647-v6x6p,Uid:3634e9ed-6def-4574-bb6c-0144a963d7b1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.390811 kubelet[2064]: E0412 19:01:24.390417 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.390811 kubelet[2064]: E0412 19:01:24.390589 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" Apr 12 19:01:24.390811 kubelet[2064]: E0412 19:01:24.390627 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" Apr 12 19:01:24.391091 kubelet[2064]: E0412 19:01:24.390728 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65c69bc647-v6x6p_calico-system(3634e9ed-6def-4574-bb6c-0144a963d7b1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65c69bc647-v6x6p_calico-system(3634e9ed-6def-4574-bb6c-0144a963d7b1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" podUID="3634e9ed-6def-4574-bb6c-0144a963d7b1" Apr 12 19:01:24.413461 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e-shm.mount: Deactivated successfully. Apr 12 19:01:24.431196 env[1135]: time="2024-04-12T19:01:24.431118239Z" level=error msg="Failed to destroy network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.439499 env[1135]: time="2024-04-12T19:01:24.431664324Z" level=error msg="encountered an error cleaning up failed sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.439499 env[1135]: time="2024-04-12T19:01:24.431825904Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grsh,Uid:f2389d86-7c35-4d5a-8e9a-d6d0f6f56391,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.434634 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86-shm.mount: Deactivated successfully. Apr 12 19:01:24.439827 kubelet[2064]: E0412 19:01:24.432147 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.439827 kubelet[2064]: E0412 19:01:24.432250 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:24.439827 kubelet[2064]: E0412 19:01:24.432287 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9grsh" Apr 12 19:01:24.440036 kubelet[2064]: E0412 19:01:24.432396 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9grsh_calico-system(f2389d86-7c35-4d5a-8e9a-d6d0f6f56391)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9grsh_calico-system(f2389d86-7c35-4d5a-8e9a-d6d0f6f56391)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:24.489545 env[1135]: time="2024-04-12T19:01:24.483373244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:01:24.489545 env[1135]: time="2024-04-12T19:01:24.486995379Z" level=info msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" Apr 12 19:01:24.489855 kubelet[2064]: I0412 19:01:24.486134 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:24.495995 kubelet[2064]: I0412 19:01:24.495957 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:24.502543 env[1135]: time="2024-04-12T19:01:24.498887916Z" level=info msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" Apr 12 19:01:24.502729 kubelet[2064]: I0412 19:01:24.501527 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:24.504031 env[1135]: time="2024-04-12T19:01:24.503973456Z" level=info msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" Apr 12 19:01:24.509617 kubelet[2064]: I0412 19:01:24.509583 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:24.511730 env[1135]: time="2024-04-12T19:01:24.511683955Z" level=info msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" Apr 12 19:01:24.622793 env[1135]: time="2024-04-12T19:01:24.622704409Z" level=error msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" failed" error="failed to destroy network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.623589 kubelet[2064]: E0412 19:01:24.623500 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:24.623790 kubelet[2064]: E0412 19:01:24.623640 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e"} Apr 12 19:01:24.623790 kubelet[2064]: E0412 19:01:24.623709 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4fb8ca4-5089-4763-867c-0feae5c722e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:01:24.623790 kubelet[2064]: E0412 19:01:24.623756 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4fb8ca4-5089-4763-867c-0feae5c722e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-kt8d8" podUID="d4fb8ca4-5089-4763-867c-0feae5c722e4" Apr 12 19:01:24.646091 env[1135]: time="2024-04-12T19:01:24.645880661Z" level=error msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" failed" error="failed to destroy network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.647214 kubelet[2064]: E0412 19:01:24.646839 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:24.647214 kubelet[2064]: E0412 19:01:24.646921 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96"} Apr 12 19:01:24.647214 kubelet[2064]: E0412 19:01:24.647016 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0da3af74-cfa5-44c0-b14a-620fc886fa93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:01:24.647214 kubelet[2064]: E0412 19:01:24.647141 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0da3af74-cfa5-44c0-b14a-620fc886fa93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9rjch" podUID="0da3af74-cfa5-44c0-b14a-620fc886fa93" Apr 12 19:01:24.655387 env[1135]: time="2024-04-12T19:01:24.655309150Z" level=error msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" failed" error="failed to destroy network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.656344 env[1135]: time="2024-04-12T19:01:24.656170929Z" level=error msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" failed" error="failed to destroy network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:01:24.657344 kubelet[2064]: E0412 19:01:24.656876 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:24.657344 kubelet[2064]: E0412 19:01:24.656956 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86"} Apr 12 19:01:24.657344 kubelet[2064]: E0412 19:01:24.657036 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:01:24.657344 kubelet[2064]: E0412 19:01:24.657100 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9grsh" podUID="f2389d86-7c35-4d5a-8e9a-d6d0f6f56391" Apr 12 19:01:24.657948 kubelet[2064]: E0412 19:01:24.657175 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:24.657948 kubelet[2064]: E0412 19:01:24.657201 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34"} Apr 12 19:01:24.657948 kubelet[2064]: E0412 19:01:24.657257 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3634e9ed-6def-4574-bb6c-0144a963d7b1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:01:24.657948 kubelet[2064]: E0412 19:01:24.657299 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3634e9ed-6def-4574-bb6c-0144a963d7b1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" podUID="3634e9ed-6def-4574-bb6c-0144a963d7b1" Apr 12 19:01:31.176476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3097971519.mount: Deactivated successfully. Apr 12 19:01:31.244407 env[1135]: time="2024-04-12T19:01:31.244315066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:31.247311 env[1135]: time="2024-04-12T19:01:31.247260150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:31.250115 env[1135]: time="2024-04-12T19:01:31.250046140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:31.252657 env[1135]: time="2024-04-12T19:01:31.252585967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:31.253543 env[1135]: time="2024-04-12T19:01:31.253470580Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 19:01:31.285265 env[1135]: time="2024-04-12T19:01:31.285190515Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:01:31.313218 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount344881417.mount: Deactivated successfully. Apr 12 19:01:31.319212 env[1135]: time="2024-04-12T19:01:31.319165824Z" level=info msg="CreateContainer within sandbox \"2c9e5661cb38ff80fb0aa226978bd7f033da473eb3319a9162fac519518f013e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7e4547c7c99199390303acf90e49fe76306e32f84b8d0b5bd10a6be916ccd3e4\"" Apr 12 19:01:31.322179 env[1135]: time="2024-04-12T19:01:31.320498276Z" level=info msg="StartContainer for \"7e4547c7c99199390303acf90e49fe76306e32f84b8d0b5bd10a6be916ccd3e4\"" Apr 12 19:01:31.352897 systemd[1]: Started cri-containerd-7e4547c7c99199390303acf90e49fe76306e32f84b8d0b5bd10a6be916ccd3e4.scope. Apr 12 19:01:31.397000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.404619 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 19:01:31.404780 kernel: audit: type=1400 audit(1712948491.397:1176): avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.397000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f611d84cc28 items=0 ppid=2534 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.458744 kernel: audit: type=1300 audit(1712948491.397:1176): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f611d84cc28 items=0 ppid=2534 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343534376337633939313939333930333033616366393065343966 Apr 12 19:01:31.466840 env[1135]: time="2024-04-12T19:01:31.466774522Z" level=info msg="StartContainer for \"7e4547c7c99199390303acf90e49fe76306e32f84b8d0b5bd10a6be916ccd3e4\" returns successfully" Apr 12 19:01:31.489543 kernel: audit: type=1327 audit(1712948491.397:1176): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343534376337633939313939333930333033616366393065343966 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.510752 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.553291 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.553443 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.577553 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.626403 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.626585 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.626632 kernel: audit: type=1400 audit(1712948491.398:1177): avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit: BPF prog-id=148 op=LOAD Apr 12 19:01:31.398000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b78e8 items=0 ppid=2534 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343534376337633939313939333930333033616366393065343966 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit: BPF prog-id=149 op=LOAD Apr 12 19:01:31.398000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b7938 items=0 ppid=2534 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343534376337633939313939333930333033616366393065343966 Apr 12 19:01:31.398000 audit: BPF prog-id=149 op=UNLOAD Apr 12 19:01:31.398000 audit: BPF prog-id=148 op=UNLOAD Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:31.398000 audit: BPF prog-id=150 op=LOAD Apr 12 19:01:31.398000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b79c8 items=0 ppid=2534 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343534376337633939313939333930333033616366393065343966 Apr 12 19:01:31.701560 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:01:31.701778 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 19:01:32.540548 kubelet[2064]: I0412 19:01:32.539998 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:01:33.208000 audit[3133]: AVC avc: denied { write } for pid=3133 comm="tee" name="fd" dev="proc" ino=24647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.208000 audit[3133]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2c76c931 a2=241 a3=1b6 items=1 ppid=3103 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.208000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:01:33.208000 audit: PATH item=0 name="/dev/fd/63" inode=23800 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.236000 audit[3154]: AVC avc: denied { write } for pid=3154 comm="tee" name="fd" dev="proc" ino=24656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.236000 audit[3154]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeed7a3921 a2=241 a3=1b6 items=1 ppid=3092 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.236000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:01:33.236000 audit: PATH item=0 name="/dev/fd/63" inode=23828 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.236000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.247000 audit[3144]: AVC avc: denied { write } for pid=3144 comm="tee" name="fd" dev="proc" ino=23837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.263000 audit[3152]: AVC avc: denied { write } for pid=3152 comm="tee" name="fd" dev="proc" ino=24662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.263000 audit[3152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff05b73933 a2=241 a3=1b6 items=1 ppid=3094 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.263000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:01:33.263000 audit: PATH item=0 name="/dev/fd/63" inode=23827 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.263000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.271000 audit[3159]: AVC avc: denied { write } for pid=3159 comm="tee" name="fd" dev="proc" ino=24666 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.271000 audit[3159]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7ef67932 a2=241 a3=1b6 items=1 ppid=3102 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.271000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:01:33.271000 audit: PATH item=0 name="/dev/fd/63" inode=23831 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.271000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.247000 audit[3144]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe26303931 a2=241 a3=1b6 items=1 ppid=3097 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.247000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:01:33.247000 audit: PATH item=0 name="/dev/fd/63" inode=23820 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.247000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.291000 audit[3164]: AVC avc: denied { write } for pid=3164 comm="tee" name="fd" dev="proc" ino=23846 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.309000 audit[3170]: AVC avc: denied { write } for pid=3170 comm="tee" name="fd" dev="proc" ino=23847 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:01:33.309000 audit[3170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff45057931 a2=241 a3=1b6 items=1 ppid=3106 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.309000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:01:33.309000 audit: PATH item=0 name="/dev/fd/63" inode=23841 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.309000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:33.291000 audit[3164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc46d82922 a2=241 a3=1b6 items=1 ppid=3096 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:33.291000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:01:33.291000 audit: PATH item=0 name="/dev/fd/63" inode=23834 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:33.291000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:01:35.016538 kubelet[2064]: I0412 19:01:35.016474 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:01:35.030716 kubelet[2064]: I0412 19:01:35.030623 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lmhjb" podStartSLOduration=5.100372886 podStartE2EDuration="25.030552434s" podCreationTimestamp="2024-04-12 19:01:10 +0000 UTC" firstStartedPulling="2024-04-12 19:01:11.323753393 +0000 UTC m=+22.283327920" lastFinishedPulling="2024-04-12 19:01:31.25393293 +0000 UTC m=+42.213507468" observedRunningTime="2024-04-12 19:01:31.581186434 +0000 UTC m=+42.540760984" watchObservedRunningTime="2024-04-12 19:01:35.030552434 +0000 UTC m=+45.990126983" Apr 12 19:01:35.050000 audit[3196]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:35.050000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe2d399e60 a2=0 a3=7ffe2d399e4c items=0 ppid=2233 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:35.051000 audit[3196]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:35.051000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe2d399e60 a2=0 a3=7ffe2d399e4c items=0 ppid=2233 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:35.221203 env[1135]: time="2024-04-12T19:01:35.221139577Z" level=info msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.286 [INFO][3214] k8s.go 585: Cleaning up netns ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.287 [INFO][3214] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" iface="eth0" netns="/var/run/netns/cni-6b8467e1-de5d-747b-30cc-1b8ae4512b4a" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.288 [INFO][3214] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" iface="eth0" netns="/var/run/netns/cni-6b8467e1-de5d-747b-30cc-1b8ae4512b4a" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.289 [INFO][3214] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" iface="eth0" netns="/var/run/netns/cni-6b8467e1-de5d-747b-30cc-1b8ae4512b4a" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.289 [INFO][3214] k8s.go 592: Releasing IP address(es) ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.289 [INFO][3214] utils.go 188: Calico CNI releasing IP address ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.319 [INFO][3220] ipam_plugin.go 415: Releasing address using handleID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.319 [INFO][3220] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.319 [INFO][3220] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.328 [WARNING][3220] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.328 [INFO][3220] ipam_plugin.go 443: Releasing address using workloadID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.331 [INFO][3220] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:35.334766 env[1135]: 2024-04-12 19:01:35.333 [INFO][3214] k8s.go 598: Teardown processing complete. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:35.341335 env[1135]: time="2024-04-12T19:01:35.336272620Z" level=info msg="TearDown network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" successfully" Apr 12 19:01:35.341335 env[1135]: time="2024-04-12T19:01:35.336333752Z" level=info msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" returns successfully" Apr 12 19:01:35.339961 systemd[1]: run-netns-cni\x2d6b8467e1\x2dde5d\x2d747b\x2d30cc\x2d1b8ae4512b4a.mount: Deactivated successfully. Apr 12 19:01:35.341963 env[1135]: time="2024-04-12T19:01:35.341779536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9rjch,Uid:0da3af74-cfa5-44c0-b14a-620fc886fa93,Namespace:kube-system,Attempt:1,}" Apr 12 19:01:35.521827 systemd-networkd[1023]: calif96994f7e88: Link UP Apr 12 19:01:35.528667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:01:35.540579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif96994f7e88: link becomes ready Apr 12 19:01:35.545220 systemd-networkd[1023]: calif96994f7e88: Gained carrier Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.401 [INFO][3226] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.417 [INFO][3226] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0 coredns-76f75df574- kube-system 0da3af74-cfa5-44c0-b14a-620fc886fa93 680 0 2024-04-12 19:01:05 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal coredns-76f75df574-9rjch eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif96994f7e88 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.417 [INFO][3226] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.452 [INFO][3238] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" HandleID="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.463 [INFO][3238] ipam_plugin.go 268: Auto assigning IP ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" HandleID="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000259590), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"coredns-76f75df574-9rjch", "timestamp":"2024-04-12 19:01:35.452737483 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.463 [INFO][3238] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.464 [INFO][3238] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.464 [INFO][3238] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.466 [INFO][3238] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.471 [INFO][3238] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.476 [INFO][3238] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.478 [INFO][3238] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.482 [INFO][3238] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.482 [INFO][3238] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.487 [INFO][3238] ipam.go 1682: Creating new handle: k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1 Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.491 [INFO][3238] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.498 [INFO][3238] ipam.go 1216: Successfully claimed IPs: [192.168.90.65/26] block=192.168.90.64/26 handle="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.498 [INFO][3238] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.65/26] handle="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.498 [INFO][3238] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:35.591052 env[1135]: 2024-04-12 19:01:35.498 [INFO][3238] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.65/26] IPv6=[] ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" HandleID="k8s-pod-network.8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.502 [INFO][3226] k8s.go 385: Populated endpoint ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0da3af74-cfa5-44c0-b14a-620fc886fa93", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-9rjch", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif96994f7e88", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.502 [INFO][3226] k8s.go 386: Calico CNI using IPs: [192.168.90.65/32] ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.502 [INFO][3226] dataplane_linux.go 68: Setting the host side veth name to calif96994f7e88 ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.545 [INFO][3226] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.562 [INFO][3226] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0da3af74-cfa5-44c0-b14a-620fc886fa93", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1", Pod:"coredns-76f75df574-9rjch", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif96994f7e88", MAC:"06:59:f0:d0:1a:01", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:35.592407 env[1135]: 2024-04-12 19:01:35.588 [INFO][3226] k8s.go 498: Wrote updated endpoint to datastore ContainerID="8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1" Namespace="kube-system" Pod="coredns-76f75df574-9rjch" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:35.620559 env[1135]: time="2024-04-12T19:01:35.620046407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:35.620559 env[1135]: time="2024-04-12T19:01:35.620152269Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:35.620559 env[1135]: time="2024-04-12T19:01:35.620192873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:35.621364 env[1135]: time="2024-04-12T19:01:35.621256073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1 pid=3270 runtime=io.containerd.runc.v2 Apr 12 19:01:35.669904 systemd[1]: Started cri-containerd-8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1.scope. Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.715000 audit: BPF prog-id=151 op=LOAD Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3270 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862623264646333616162306462643433643762353166623165613265 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3270 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862623264646333616162306462643433643762353166623165613265 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit: BPF prog-id=152 op=LOAD Apr 12 19:01:35.716000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034bce0 items=0 ppid=3270 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862623264646333616162306462643433643762353166623165613265 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.716000 audit: BPF prog-id=153 op=LOAD Apr 12 19:01:35.716000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034bd28 items=0 ppid=3270 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862623264646333616162306462643433643762353166623165613265 Apr 12 19:01:35.717000 audit: BPF prog-id=153 op=UNLOAD Apr 12 19:01:35.717000 audit: BPF prog-id=152 op=UNLOAD Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.717000 audit: BPF prog-id=154 op=LOAD Apr 12 19:01:35.717000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cc138 items=0 ppid=3270 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862623264646333616162306462643433643762353166623165613265 Apr 12 19:01:35.796061 env[1135]: time="2024-04-12T19:01:35.795990828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9rjch,Uid:0da3af74-cfa5-44c0-b14a-620fc886fa93,Namespace:kube-system,Attempt:1,} returns sandbox id \"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1\"" Apr 12 19:01:35.801346 env[1135]: time="2024-04-12T19:01:35.801288088Z" level=info msg="CreateContainer within sandbox \"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:01:35.824709 env[1135]: time="2024-04-12T19:01:35.824636962Z" level=info msg="CreateContainer within sandbox \"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"37461d5a0e7c0052db611633a066583ed6d51aa9700bd3afa7f0e1cc77c747fe\"" Apr 12 19:01:35.825905 env[1135]: time="2024-04-12T19:01:35.825853818Z" level=info msg="StartContainer for \"37461d5a0e7c0052db611633a066583ed6d51aa9700bd3afa7f0e1cc77c747fe\"" Apr 12 19:01:35.883434 systemd[1]: Started cri-containerd-37461d5a0e7c0052db611633a066583ed6d51aa9700bd3afa7f0e1cc77c747fe.scope. Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.932000 audit: BPF prog-id=155 op=LOAD Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3270 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343631643561306537633030353264623631313633336130363635 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3270 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343631643561306537633030353264623631313633336130363635 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit: BPF prog-id=156 op=LOAD Apr 12 19:01:35.934000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025410 items=0 ppid=3270 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343631643561306537633030353264623631313633336130363635 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit: BPF prog-id=157 op=LOAD Apr 12 19:01:35.934000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025458 items=0 ppid=3270 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343631643561306537633030353264623631313633336130363635 Apr 12 19:01:35.934000 audit: BPF prog-id=157 op=UNLOAD Apr 12 19:01:35.934000 audit: BPF prog-id=156 op=UNLOAD Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:35.934000 audit: BPF prog-id=158 op=LOAD Apr 12 19:01:35.934000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025868 items=0 ppid=3270 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:35.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343631643561306537633030353264623631313633336130363635 Apr 12 19:01:35.976024 env[1135]: time="2024-04-12T19:01:35.975961210Z" level=info msg="StartContainer for \"37461d5a0e7c0052db611633a066583ed6d51aa9700bd3afa7f0e1cc77c747fe\" returns successfully" Apr 12 19:01:36.220936 env[1135]: time="2024-04-12T19:01:36.220797694Z" level=info msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" Apr 12 19:01:36.222592 env[1135]: time="2024-04-12T19:01:36.221567143Z" level=info msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" Apr 12 19:01:36.341874 systemd[1]: run-containerd-runc-k8s.io-8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1-runc.0UShK8.mount: Deactivated successfully. Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.336 [INFO][3421] k8s.go 585: Cleaning up netns ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.336 [INFO][3421] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" iface="eth0" netns="/var/run/netns/cni-a92e7050-936c-6632-de0b-a3ae60fed4bc" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.336 [INFO][3421] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" iface="eth0" netns="/var/run/netns/cni-a92e7050-936c-6632-de0b-a3ae60fed4bc" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.343 [INFO][3421] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" iface="eth0" netns="/var/run/netns/cni-a92e7050-936c-6632-de0b-a3ae60fed4bc" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.343 [INFO][3421] k8s.go 592: Releasing IP address(es) ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.343 [INFO][3421] utils.go 188: Calico CNI releasing IP address ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.451 [INFO][3447] ipam_plugin.go 415: Releasing address using handleID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.454 [INFO][3447] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.454 [INFO][3447] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.473 [WARNING][3447] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.473 [INFO][3447] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.475 [INFO][3447] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:36.484063 env[1135]: 2024-04-12 19:01:36.482 [INFO][3421] k8s.go 598: Teardown processing complete. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:36.488530 systemd[1]: run-netns-cni\x2da92e7050\x2d936c\x2d6632\x2dde0b\x2da3ae60fed4bc.mount: Deactivated successfully. Apr 12 19:01:36.489345 env[1135]: time="2024-04-12T19:01:36.489129085Z" level=info msg="TearDown network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" successfully" Apr 12 19:01:36.489345 env[1135]: time="2024-04-12T19:01:36.489184136Z" level=info msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" returns successfully" Apr 12 19:01:36.490487 env[1135]: time="2024-04-12T19:01:36.490089543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grsh,Uid:f2389d86-7c35-4d5a-8e9a-d6d0f6f56391,Namespace:calico-system,Attempt:1,}" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.394 [INFO][3435] k8s.go 585: Cleaning up netns ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.394 [INFO][3435] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" iface="eth0" netns="/var/run/netns/cni-e2229343-747d-35fb-9293-dd4b64731ab9" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.395 [INFO][3435] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" iface="eth0" netns="/var/run/netns/cni-e2229343-747d-35fb-9293-dd4b64731ab9" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.395 [INFO][3435] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" iface="eth0" netns="/var/run/netns/cni-e2229343-747d-35fb-9293-dd4b64731ab9" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.395 [INFO][3435] k8s.go 592: Releasing IP address(es) ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.395 [INFO][3435] utils.go 188: Calico CNI releasing IP address ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.471 [INFO][3454] ipam_plugin.go 415: Releasing address using handleID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.471 [INFO][3454] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.476 [INFO][3454] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.500 [WARNING][3454] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.500 [INFO][3454] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.502 [INFO][3454] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:36.509370 env[1135]: 2024-04-12 19:01:36.506 [INFO][3435] k8s.go 598: Teardown processing complete. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:36.513590 env[1135]: time="2024-04-12T19:01:36.513498010Z" level=info msg="TearDown network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" successfully" Apr 12 19:01:36.513759 env[1135]: time="2024-04-12T19:01:36.513727045Z" level=info msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" returns successfully" Apr 12 19:01:36.515626 env[1135]: time="2024-04-12T19:01:36.514810069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c69bc647-v6x6p,Uid:3634e9ed-6def-4574-bb6c-0144a963d7b1,Namespace:calico-system,Attempt:1,}" Apr 12 19:01:36.515356 systemd[1]: run-netns-cni\x2de2229343\x2d747d\x2d35fb\x2d9293\x2ddd4b64731ab9.mount: Deactivated successfully. Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.636094 kernel: kauditd_printk_skb: 188 callbacks suppressed Apr 12 19:01:36.636147 kernel: audit: type=1400 audit(1712948496.628:1227): avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.682214 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:36.682393 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:36.682446 kernel: audit: backlog limit exceeded Apr 12 19:01:36.682489 kernel: audit: type=1400 audit(1712948496.628:1227): avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.682634 kubelet[2064]: I0412 19:01:36.668295 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-9rjch" podStartSLOduration=31.66823058 podStartE2EDuration="31.66823058s" podCreationTimestamp="2024-04-12 19:01:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:01:36.594579514 +0000 UTC m=+47.554154070" watchObservedRunningTime="2024-04-12 19:01:36.66823058 +0000 UTC m=+47.627805130" Apr 12 19:01:36.747338 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:36.747535 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:36.747618 kernel: audit: backlog limit exceeded Apr 12 19:01:36.747659 kernel: audit: type=1400 audit(1712948496.628:1227): avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.747696 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.628000 audit: BPF prog-id=159 op=LOAD Apr 12 19:01:36.628000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff772a020 a2=70 a3=7f39b60a6000 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.628000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.657000 audit: BPF prog-id=159 op=UNLOAD Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit: BPF prog-id=160 op=LOAD Apr 12 19:01:36.657000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff772a020 a2=70 a3=6f items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.657000 audit: BPF prog-id=160 op=UNLOAD Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff7729fd0 a2=70 a3=7ffff772a020 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit: BPF prog-id=161 op=LOAD Apr 12 19:01:36.657000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffff7729fb0 a2=70 a3=7ffff772a020 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.657000 audit: BPF prog-id=161 op=UNLOAD Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff772a090 a2=70 a3=0 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.657000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.657000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff772a080 a2=70 a3=0 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.658000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.658000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff7729ff0 a2=70 a3=0 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.659000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.659000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffff772a0c0 a2=70 a3=1a21e10 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.659000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.663000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.663000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff772a0c0 a2=70 a3=1a1e880 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.663000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.663000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.663000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.663000 audit[3494]: AVC avc: denied { perfmon } for pid=3494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.663000 audit[3494]: AVC avc: denied { bpf } for pid=3494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.663000 audit: BPF prog-id=162 op=LOAD Apr 12 19:01:36.663000 audit[3494]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff7729fe0 a2=70 a3=0 items=0 ppid=3279 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.663000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:01:36.780000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.780000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45010eb0 a2=70 a3=fff80800 items=0 ppid=3279 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.780000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:01:36.780000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:36.780000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45010d80 a2=70 a3=3 items=0 ppid=3279 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.780000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:01:36.789000 audit: BPF prog-id=162 op=UNLOAD Apr 12 19:01:36.839000 audit[3512]: NETFILTER_CFG table=filter:97 family=2 entries=14 op=nft_register_rule pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:36.839000 audit[3512]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdd415d850 a2=0 a3=7ffdd415d83c items=0 ppid=2233 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:36.840000 audit[3512]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:36.840000 audit[3512]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdd415d850 a2=0 a3=0 items=0 ppid=2233 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:36.887000 audit[3525]: NETFILTER_CFG table=filter:99 family=2 entries=11 op=nft_register_rule pid=3525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:36.887000 audit[3525]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff7ff97a50 a2=0 a3=7fff7ff97a3c items=0 ppid=2233 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:36.895000 audit[3525]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:36.895000 audit[3525]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff7ff97a50 a2=0 a3=7fff7ff97a3c items=0 ppid=2233 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:36.969000 audit[3537]: NETFILTER_CFG table=raw:101 family=2 entries=19 op=nft_register_chain pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:36.969000 audit[3537]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fffc028d4f0 a2=0 a3=7fffc028d4dc items=0 ppid=3279 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:36.969000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:36.983396 systemd-networkd[1023]: cali7443bcb6adc: Link UP Apr 12 19:01:36.992567 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7443bcb6adc: link becomes ready Apr 12 19:01:36.992830 systemd-networkd[1023]: cali7443bcb6adc: Gained carrier Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.811 [INFO][3464] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0 csi-node-driver- calico-system f2389d86-7c35-4d5a-8e9a-d6d0f6f56391 691 0 2024-04-12 19:01:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal csi-node-driver-9grsh eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7443bcb6adc [] []}} ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.812 [INFO][3464] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.903 [INFO][3518] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" HandleID="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.923 [INFO][3518] ipam_plugin.go 268: Auto assigning IP ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" HandleID="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c7f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"csi-node-driver-9grsh", "timestamp":"2024-04-12 19:01:36.903484408 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.923 [INFO][3518] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.924 [INFO][3518] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.924 [INFO][3518] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.931 [INFO][3518] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.940 [INFO][3518] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.951 [INFO][3518] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.958 [INFO][3518] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.961 [INFO][3518] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.961 [INFO][3518] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.963 [INFO][3518] ipam.go 1682: Creating new handle: k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.969 [INFO][3518] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.977 [INFO][3518] ipam.go 1216: Successfully claimed IPs: [192.168.90.66/26] block=192.168.90.64/26 handle="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.977 [INFO][3518] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.66/26] handle="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.977 [INFO][3518] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:37.019899 env[1135]: 2024-04-12 19:01:36.977 [INFO][3518] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.66/26] IPv6=[] ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" HandleID="k8s-pod-network.88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:36.979 [INFO][3464] k8s.go 385: Populated endpoint ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-9grsh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7443bcb6adc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:36.980 [INFO][3464] k8s.go 386: Calico CNI using IPs: [192.168.90.66/32] ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:36.980 [INFO][3464] dataplane_linux.go 68: Setting the host side veth name to cali7443bcb6adc ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:36.993 [INFO][3464] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:37.000 [INFO][3464] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a", Pod:"csi-node-driver-9grsh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7443bcb6adc", MAC:"ce:f4:4d:74:73:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:37.021200 env[1135]: 2024-04-12 19:01:37.017 [INFO][3464] k8s.go 498: Wrote updated endpoint to datastore ContainerID="88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a" Namespace="calico-system" Pod="csi-node-driver-9grsh" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:37.022000 audit[3548]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:37.022000 audit[3548]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff746fa650 a2=0 a3=7fff746fa63c items=0 ppid=3279 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.022000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:37.051914 env[1135]: time="2024-04-12T19:01:37.051831438Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:37.052111 env[1135]: time="2024-04-12T19:01:37.051932920Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:37.052111 env[1135]: time="2024-04-12T19:01:37.051974666Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:37.052257 env[1135]: time="2024-04-12T19:01:37.052194968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a pid=3566 runtime=io.containerd.runc.v2 Apr 12 19:01:37.055000 audit[3547]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:37.055000 audit[3547]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff77168440 a2=0 a3=7fff7716842c items=0 ppid=3279 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.055000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:37.079105 systemd-networkd[1023]: cali715eb8b36ab: Link UP Apr 12 19:01:37.088563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali715eb8b36ab: link becomes ready Apr 12 19:01:37.090608 systemd-networkd[1023]: cali715eb8b36ab: Gained carrier Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.816 [INFO][3472] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0 calico-kube-controllers-65c69bc647- calico-system 3634e9ed-6def-4574-bb6c-0144a963d7b1 692 0 2024-04-12 19:01:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65c69bc647 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal calico-kube-controllers-65c69bc647-v6x6p eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali715eb8b36ab [] []}} ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.816 [INFO][3472] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.935 [INFO][3514] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" HandleID="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.954 [INFO][3514] ipam_plugin.go 268: Auto assigning IP ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" HandleID="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c7f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"calico-kube-controllers-65c69bc647-v6x6p", "timestamp":"2024-04-12 19:01:36.935927655 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.954 [INFO][3514] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.977 [INFO][3514] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.977 [INFO][3514] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:36.994 [INFO][3514] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.010 [INFO][3514] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.035 [INFO][3514] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.038 [INFO][3514] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.041 [INFO][3514] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.042 [INFO][3514] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.046 [INFO][3514] ipam.go 1682: Creating new handle: k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827 Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.057 [INFO][3514] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.069 [INFO][3514] ipam.go 1216: Successfully claimed IPs: [192.168.90.67/26] block=192.168.90.64/26 handle="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.069 [INFO][3514] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.67/26] handle="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.069 [INFO][3514] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:37.110990 env[1135]: 2024-04-12 19:01:37.069 [INFO][3514] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.67/26] IPv6=[] ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" HandleID="k8s-pod-network.822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.072 [INFO][3472] k8s.go 385: Populated endpoint ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0", GenerateName:"calico-kube-controllers-65c69bc647-", Namespace:"calico-system", SelfLink:"", UID:"3634e9ed-6def-4574-bb6c-0144a963d7b1", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c69bc647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-65c69bc647-v6x6p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali715eb8b36ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.072 [INFO][3472] k8s.go 386: Calico CNI using IPs: [192.168.90.67/32] ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.072 [INFO][3472] dataplane_linux.go 68: Setting the host side veth name to cali715eb8b36ab ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.091 [INFO][3472] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.091 [INFO][3472] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0", GenerateName:"calico-kube-controllers-65c69bc647-", Namespace:"calico-system", SelfLink:"", UID:"3634e9ed-6def-4574-bb6c-0144a963d7b1", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c69bc647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827", Pod:"calico-kube-controllers-65c69bc647-v6x6p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali715eb8b36ab", MAC:"f2:45:9b:4f:d5:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:37.112216 env[1135]: 2024-04-12 19:01:37.104 [INFO][3472] k8s.go 498: Wrote updated endpoint to datastore ContainerID="822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827" Namespace="calico-system" Pod="calico-kube-controllers-65c69bc647-v6x6p" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:37.116470 systemd[1]: Started cri-containerd-88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a.scope. Apr 12 19:01:37.125000 audit[3558]: NETFILTER_CFG table=filter:104 family=2 entries=71 op=nft_register_chain pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:37.125000 audit[3558]: SYSCALL arch=c000003e syscall=46 success=yes exit=37660 a0=3 a1=7ffc6c4c6200 a2=0 a3=7ffc6c4c61ec items=0 ppid=3279 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:37.159143 env[1135]: time="2024-04-12T19:01:37.159062169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:37.159392 env[1135]: time="2024-04-12T19:01:37.159357605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:37.159574 env[1135]: time="2024-04-12T19:01:37.159536139Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:37.159915 env[1135]: time="2024-04-12T19:01:37.159868282Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827 pid=3611 runtime=io.containerd.runc.v2 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.177000 audit: BPF prog-id=163 op=LOAD Apr 12 19:01:37.179000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.179000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3566 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353631613464393133313961326430633133663266353839623764 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3566 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353631613464393133313961326430633133663266353839623764 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.180000 audit: BPF prog-id=164 op=LOAD Apr 12 19:01:37.180000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000202ed0 items=0 ppid=3566 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353631613464393133313961326430633133663266353839623764 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.182000 audit: BPF prog-id=165 op=LOAD Apr 12 19:01:37.182000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000202f18 items=0 ppid=3566 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353631613464393133313961326430633133663266353839623764 Apr 12 19:01:37.183000 audit: BPF prog-id=165 op=UNLOAD Apr 12 19:01:37.183000 audit: BPF prog-id=164 op=UNLOAD Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.184000 audit: BPF prog-id=166 op=LOAD Apr 12 19:01:37.184000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000203328 items=0 ppid=3566 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353631613464393133313961326430633133663266353839623764 Apr 12 19:01:37.214384 systemd[1]: Started cri-containerd-822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827.scope. Apr 12 19:01:37.249000 audit[3640]: NETFILTER_CFG table=filter:105 family=2 entries=72 op=nft_register_chain pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:37.249000 audit[3640]: SYSCALL arch=c000003e syscall=46 success=yes exit=40184 a0=3 a1=7ffe43e1db30 a2=0 a3=7ffe43e1db1c items=0 ppid=3279 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.249000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:37.252669 systemd-networkd[1023]: vxlan.calico: Link UP Apr 12 19:01:37.252684 systemd-networkd[1023]: vxlan.calico: Gained carrier Apr 12 19:01:37.279094 env[1135]: time="2024-04-12T19:01:37.278946082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grsh,Uid:f2389d86-7c35-4d5a-8e9a-d6d0f6f56391,Namespace:calico-system,Attempt:1,} returns sandbox id \"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a\"" Apr 12 19:01:37.284773 env[1135]: time="2024-04-12T19:01:37.284722092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.312000 audit: BPF prog-id=167 op=LOAD Apr 12 19:01:37.313000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.313000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3611 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323437306335363430616236313366376134656334663431343434 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3611 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323437306335363430616236313366376134656334663431343434 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.314000 audit: BPF prog-id=168 op=LOAD Apr 12 19:01:37.314000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c20a0 items=0 ppid=3611 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323437306335363430616236313366376134656334663431343434 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.315000 audit: BPF prog-id=169 op=LOAD Apr 12 19:01:37.315000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c20e8 items=0 ppid=3611 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323437306335363430616236313366376134656334663431343434 Apr 12 19:01:37.316000 audit: BPF prog-id=169 op=UNLOAD Apr 12 19:01:37.316000 audit: BPF prog-id=168 op=UNLOAD Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:37.316000 audit: BPF prog-id=170 op=LOAD Apr 12 19:01:37.316000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c24f8 items=0 ppid=3611 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:37.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323437306335363430616236313366376134656334663431343434 Apr 12 19:01:37.372392 env[1135]: time="2024-04-12T19:01:37.372327433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c69bc647-v6x6p,Uid:3634e9ed-6def-4574-bb6c-0144a963d7b1,Namespace:calico-system,Attempt:1,} returns sandbox id \"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827\"" Apr 12 19:01:37.426392 systemd-networkd[1023]: calif96994f7e88: Gained IPv6LL Apr 12 19:01:38.145972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1545283650.mount: Deactivated successfully. Apr 12 19:01:38.257371 systemd-networkd[1023]: cali7443bcb6adc: Gained IPv6LL Apr 12 19:01:38.322368 systemd-networkd[1023]: cali715eb8b36ab: Gained IPv6LL Apr 12 19:01:38.449043 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Apr 12 19:01:38.547147 env[1135]: time="2024-04-12T19:01:38.547074745Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:38.550050 env[1135]: time="2024-04-12T19:01:38.549991472Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:38.552756 env[1135]: time="2024-04-12T19:01:38.552710394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:38.554985 env[1135]: time="2024-04-12T19:01:38.554946464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:38.555852 env[1135]: time="2024-04-12T19:01:38.555797196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 19:01:38.558076 env[1135]: time="2024-04-12T19:01:38.558038218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 19:01:38.559777 env[1135]: time="2024-04-12T19:01:38.559719948Z" level=info msg="CreateContainer within sandbox \"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:01:38.587960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3632431988.mount: Deactivated successfully. Apr 12 19:01:38.596725 env[1135]: time="2024-04-12T19:01:38.596663382Z" level=info msg="CreateContainer within sandbox \"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"039dd78329a13a5c1b533d77b3a3cad600183f73f1c9ede37acf3359921c2f3a\"" Apr 12 19:01:38.599796 env[1135]: time="2024-04-12T19:01:38.599752656Z" level=info msg="StartContainer for \"039dd78329a13a5c1b533d77b3a3cad600183f73f1c9ede37acf3359921c2f3a\"" Apr 12 19:01:38.643226 systemd[1]: run-containerd-runc-k8s.io-039dd78329a13a5c1b533d77b3a3cad600183f73f1c9ede37acf3359921c2f3a-runc.dj7nj2.mount: Deactivated successfully. Apr 12 19:01:38.649434 systemd[1]: Started cri-containerd-039dd78329a13a5c1b533d77b3a3cad600183f73f1c9ede37acf3359921c2f3a.scope. Apr 12 19:01:38.673000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.673000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f722d807ba8 items=0 ppid=3566 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:38.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396464373833323961313361356331623533336437376233613363 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit: BPF prog-id=171 op=LOAD Apr 12 19:01:38.674000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003088c8 items=0 ppid=3566 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:38.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396464373833323961313361356331623533336437376233613363 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit: BPF prog-id=172 op=LOAD Apr 12 19:01:38.674000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000308918 items=0 ppid=3566 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:38.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396464373833323961313361356331623533336437376233613363 Apr 12 19:01:38.674000 audit: BPF prog-id=172 op=UNLOAD Apr 12 19:01:38.674000 audit: BPF prog-id=171 op=UNLOAD Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:38.674000 audit: BPF prog-id=173 op=LOAD Apr 12 19:01:38.674000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003089a8 items=0 ppid=3566 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:38.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396464373833323961313361356331623533336437376233613363 Apr 12 19:01:38.699619 env[1135]: time="2024-04-12T19:01:38.699550696Z" level=info msg="StartContainer for \"039dd78329a13a5c1b533d77b3a3cad600183f73f1c9ede37acf3359921c2f3a\" returns successfully" Apr 12 19:01:39.223786 env[1135]: time="2024-04-12T19:01:39.223722463Z" level=info msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.304 [INFO][3710] k8s.go 585: Cleaning up netns ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.304 [INFO][3710] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" iface="eth0" netns="/var/run/netns/cni-8ff847e2-2ea9-6975-46fa-0f494d4ae43b" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.305 [INFO][3710] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" iface="eth0" netns="/var/run/netns/cni-8ff847e2-2ea9-6975-46fa-0f494d4ae43b" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.305 [INFO][3710] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" iface="eth0" netns="/var/run/netns/cni-8ff847e2-2ea9-6975-46fa-0f494d4ae43b" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.305 [INFO][3710] k8s.go 592: Releasing IP address(es) ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.305 [INFO][3710] utils.go 188: Calico CNI releasing IP address ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.347 [INFO][3716] ipam_plugin.go 415: Releasing address using handleID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.347 [INFO][3716] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.347 [INFO][3716] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.358 [WARNING][3716] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.358 [INFO][3716] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.360 [INFO][3716] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:39.364372 env[1135]: 2024-04-12 19:01:39.362 [INFO][3710] k8s.go 598: Teardown processing complete. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:39.365260 env[1135]: time="2024-04-12T19:01:39.364499590Z" level=info msg="TearDown network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" successfully" Apr 12 19:01:39.365260 env[1135]: time="2024-04-12T19:01:39.364565242Z" level=info msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" returns successfully" Apr 12 19:01:39.365934 env[1135]: time="2024-04-12T19:01:39.365882332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-kt8d8,Uid:d4fb8ca4-5089-4763-867c-0feae5c722e4,Namespace:kube-system,Attempt:1,}" Apr 12 19:01:39.583914 systemd[1]: run-netns-cni\x2d8ff847e2\x2d2ea9\x2d6975\x2d46fa\x2d0f494d4ae43b.mount: Deactivated successfully. Apr 12 19:01:39.610362 systemd-networkd[1023]: cali6399146e16e: Link UP Apr 12 19:01:39.616643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:01:39.624735 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6399146e16e: link becomes ready Apr 12 19:01:39.625795 systemd-networkd[1023]: cali6399146e16e: Gained carrier Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.449 [INFO][3723] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0 coredns-76f75df574- kube-system d4fb8ca4-5089-4763-867c-0feae5c722e4 720 0 2024-04-12 19:01:05 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal coredns-76f75df574-kt8d8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6399146e16e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.449 [INFO][3723] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.500 [INFO][3734] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" HandleID="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.516 [INFO][3734] ipam_plugin.go 268: Auto assigning IP ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" HandleID="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281860), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"coredns-76f75df574-kt8d8", "timestamp":"2024-04-12 19:01:39.500355363 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.517 [INFO][3734] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.517 [INFO][3734] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.517 [INFO][3734] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.520 [INFO][3734] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.531 [INFO][3734] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.548 [INFO][3734] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.552 [INFO][3734] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.556 [INFO][3734] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.556 [INFO][3734] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.569 [INFO][3734] ipam.go 1682: Creating new handle: k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6 Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.577 [INFO][3734] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.599 [INFO][3734] ipam.go 1216: Successfully claimed IPs: [192.168.90.68/26] block=192.168.90.64/26 handle="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.600 [INFO][3734] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.68/26] handle="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.601 [INFO][3734] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:39.650943 env[1135]: 2024-04-12 19:01:39.601 [INFO][3734] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.68/26] IPv6=[] ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" HandleID="k8s-pod-network.ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.604 [INFO][3723] k8s.go 385: Populated endpoint ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d4fb8ca4-5089-4763-867c-0feae5c722e4", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-kt8d8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6399146e16e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.604 [INFO][3723] k8s.go 386: Calico CNI using IPs: [192.168.90.68/32] ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.604 [INFO][3723] dataplane_linux.go 68: Setting the host side veth name to cali6399146e16e ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.627 [INFO][3723] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.628 [INFO][3723] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d4fb8ca4-5089-4763-867c-0feae5c722e4", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6", Pod:"coredns-76f75df574-kt8d8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6399146e16e", MAC:"b2:1f:fd:33:08:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:39.652862 env[1135]: 2024-04-12 19:01:39.647 [INFO][3723] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6" Namespace="kube-system" Pod="coredns-76f75df574-kt8d8" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:39.679000 audit[3754]: NETFILTER_CFG table=filter:106 family=2 entries=34 op=nft_register_chain pid=3754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:39.679000 audit[3754]: SYSCALL arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7ffd2e18cd10 a2=0 a3=7ffd2e18ccfc items=0 ppid=3279 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:39.708086 env[1135]: time="2024-04-12T19:01:39.707421430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:39.708086 env[1135]: time="2024-04-12T19:01:39.707535693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:39.708086 env[1135]: time="2024-04-12T19:01:39.707584600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:39.708429 env[1135]: time="2024-04-12T19:01:39.708119307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6 pid=3763 runtime=io.containerd.runc.v2 Apr 12 19:01:39.757198 kubelet[2064]: I0412 19:01:39.755987 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:01:39.784519 systemd[1]: Started cri-containerd-ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6.scope. Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.812000 audit: BPF prog-id=174 op=LOAD Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3763 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163326239623833326138346631303436626436346261623763663639 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3763 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163326239623833326138346631303436626436346261623763663639 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.814000 audit: BPF prog-id=175 op=LOAD Apr 12 19:01:39.814000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c2010 items=0 ppid=3763 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163326239623833326138346631303436626436346261623763663639 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit: BPF prog-id=176 op=LOAD Apr 12 19:01:39.815000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c2058 items=0 ppid=3763 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163326239623833326138346631303436626436346261623763663639 Apr 12 19:01:39.815000 audit: BPF prog-id=176 op=UNLOAD Apr 12 19:01:39.815000 audit: BPF prog-id=175 op=UNLOAD Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { perfmon } for pid=3773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit[3773]: AVC avc: denied { bpf } for pid=3773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:39.815000 audit: BPF prog-id=177 op=LOAD Apr 12 19:01:39.815000 audit[3773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c2468 items=0 ppid=3763 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:39.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163326239623833326138346631303436626436346261623763663639 Apr 12 19:01:39.849781 systemd[1]: run-containerd-runc-k8s.io-7e4547c7c99199390303acf90e49fe76306e32f84b8d0b5bd10a6be916ccd3e4-runc.i01zau.mount: Deactivated successfully. Apr 12 19:01:39.912706 env[1135]: time="2024-04-12T19:01:39.912622589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-kt8d8,Uid:d4fb8ca4-5089-4763-867c-0feae5c722e4,Namespace:kube-system,Attempt:1,} returns sandbox id \"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6\"" Apr 12 19:01:39.926572 env[1135]: time="2024-04-12T19:01:39.926488816Z" level=info msg="CreateContainer within sandbox \"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:01:39.986855 env[1135]: time="2024-04-12T19:01:39.986787916Z" level=info msg="CreateContainer within sandbox \"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fbdc92d1070ca952be597d51c9e8ccc945532cd6debb037e28145ac8b4ef44dc\"" Apr 12 19:01:39.988461 env[1135]: time="2024-04-12T19:01:39.988414822Z" level=info msg="StartContainer for \"fbdc92d1070ca952be597d51c9e8ccc945532cd6debb037e28145ac8b4ef44dc\"" Apr 12 19:01:40.065337 systemd[1]: Started cri-containerd-fbdc92d1070ca952be597d51c9e8ccc945532cd6debb037e28145ac8b4ef44dc.scope. Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.122000 audit: BPF prog-id=178 op=LOAD Apr 12 19:01:40.123000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.123000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3763 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646339326431303730636139353262653539376435316339653863 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3763 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646339326431303730636139353262653539376435316339653863 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.124000 audit: BPF prog-id=179 op=LOAD Apr 12 19:01:40.124000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dd60 items=0 ppid=3763 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646339326431303730636139353262653539376435316339653863 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.126000 audit: BPF prog-id=180 op=LOAD Apr 12 19:01:40.126000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dda8 items=0 ppid=3763 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646339326431303730636139353262653539376435316339653863 Apr 12 19:01:40.127000 audit: BPF prog-id=180 op=UNLOAD Apr 12 19:01:40.127000 audit: BPF prog-id=179 op=UNLOAD Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:40.127000 audit: BPF prog-id=181 op=LOAD Apr 12 19:01:40.127000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037e1b8 items=0 ppid=3763 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646339326431303730636139353262653539376435316339653863 Apr 12 19:01:40.185759 env[1135]: time="2024-04-12T19:01:40.185682299Z" level=info msg="StartContainer for \"fbdc92d1070ca952be597d51c9e8ccc945532cd6debb037e28145ac8b4ef44dc\" returns successfully" Apr 12 19:01:40.655101 kubelet[2064]: I0412 19:01:40.655055 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-kt8d8" podStartSLOduration=35.654983741 podStartE2EDuration="35.654983741s" podCreationTimestamp="2024-04-12 19:01:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:01:40.629350004 +0000 UTC m=+51.588924556" watchObservedRunningTime="2024-04-12 19:01:40.654983741 +0000 UTC m=+51.614558293" Apr 12 19:01:40.900000 audit[3880]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:40.900000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc2dbdece0 a2=0 a3=7ffc2dbdeccc items=0 ppid=2233 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:40.903000 audit[3880]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:40.903000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc2dbdece0 a2=0 a3=7ffc2dbdeccc items=0 ppid=2233 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:40.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:41.079000 audit[3882]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:41.079000 audit[3882]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff26ec48b0 a2=0 a3=7fff26ec489c items=0 ppid=2233 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:41.105000 audit[3882]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:41.105000 audit[3882]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff26ec48b0 a2=0 a3=7fff26ec489c items=0 ppid=2233 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:41.510083 env[1135]: time="2024-04-12T19:01:41.510012089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:41.514796 env[1135]: time="2024-04-12T19:01:41.514750268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:41.519446 env[1135]: time="2024-04-12T19:01:41.519380566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:41.523101 env[1135]: time="2024-04-12T19:01:41.522979977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:41.524717 env[1135]: time="2024-04-12T19:01:41.524659386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 19:01:41.528382 env[1135]: time="2024-04-12T19:01:41.528332181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:01:41.566039 env[1135]: time="2024-04-12T19:01:41.565971297Z" level=info msg="CreateContainer within sandbox \"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 19:01:41.585209 systemd-networkd[1023]: cali6399146e16e: Gained IPv6LL Apr 12 19:01:41.586702 env[1135]: time="2024-04-12T19:01:41.586586202Z" level=info msg="CreateContainer within sandbox \"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb\"" Apr 12 19:01:41.587769 env[1135]: time="2024-04-12T19:01:41.587724867Z" level=info msg="StartContainer for \"12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb\"" Apr 12 19:01:41.654217 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.Vygaj9.mount: Deactivated successfully. Apr 12 19:01:41.657721 systemd[1]: Started cri-containerd-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb.scope. Apr 12 19:01:41.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730439 kernel: kauditd_printk_skb: 392 callbacks suppressed Apr 12 19:01:41.730619 kernel: audit: type=1400 audit(1712948501.716:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.781983 kernel: audit: type=1400 audit(1712948501.716:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.820612 kernel: audit: type=1400 audit(1712948501.730:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.821841 env[1135]: time="2024-04-12T19:01:41.821779354Z" level=info msg="StartContainer for \"12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb\" returns successfully" Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.846554 kernel: audit: type=1400 audit(1712948501.730:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.868580 kernel: audit: type=1400 audit(1712948501.730:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.890589 kernel: audit: type=1400 audit(1712948501.730:1340): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.934081 kernel: audit: type=1400 audit(1712948501.730:1341): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.934275 kernel: audit: type=1400 audit(1712948501.730:1342): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.934333 kernel: audit: type=1400 audit(1712948501.730:1343): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.975533 kernel: audit: type=1400 audit(1712948501.743:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.743000 audit: BPF prog-id=182 op=LOAD Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3611 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132636436303735386264613730323435376137336130303932343235 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3611 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132636436303735386264613730323435376137336130303932343235 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit: BPF prog-id=183 op=LOAD Apr 12 19:01:41.744000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cc1e0 items=0 ppid=3611 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132636436303735386264613730323435376137336130303932343235 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit: BPF prog-id=184 op=LOAD Apr 12 19:01:41.744000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cc228 items=0 ppid=3611 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132636436303735386264613730323435376137336130303932343235 Apr 12 19:01:41.744000 audit: BPF prog-id=184 op=UNLOAD Apr 12 19:01:41.744000 audit: BPF prog-id=183 op=UNLOAD Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:41.744000 audit: BPF prog-id=185 op=LOAD Apr 12 19:01:41.744000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cc638 items=0 ppid=3611 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:41.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132636436303735386264613730323435376137336130303932343235 Apr 12 19:01:42.711471 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.NcOKh4.mount: Deactivated successfully. Apr 12 19:01:42.921452 kubelet[2064]: I0412 19:01:42.920940 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65c69bc647-v6x6p" podStartSLOduration=28.768561052 podStartE2EDuration="32.920854007s" podCreationTimestamp="2024-04-12 19:01:10 +0000 UTC" firstStartedPulling="2024-04-12 19:01:37.374243661 +0000 UTC m=+48.333818200" lastFinishedPulling="2024-04-12 19:01:41.526536563 +0000 UTC m=+52.486111155" observedRunningTime="2024-04-12 19:01:42.641282915 +0000 UTC m=+53.600857465" watchObservedRunningTime="2024-04-12 19:01:42.920854007 +0000 UTC m=+53.880428556" Apr 12 19:01:43.112754 env[1135]: time="2024-04-12T19:01:43.112681478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:43.117781 env[1135]: time="2024-04-12T19:01:43.117739520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:43.122484 env[1135]: time="2024-04-12T19:01:43.122444180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:43.126432 env[1135]: time="2024-04-12T19:01:43.126388330Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:43.127844 env[1135]: time="2024-04-12T19:01:43.127787048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 19:01:43.132912 env[1135]: time="2024-04-12T19:01:43.132871244Z" level=info msg="CreateContainer within sandbox \"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:01:43.162308 env[1135]: time="2024-04-12T19:01:43.162222190Z" level=info msg="CreateContainer within sandbox \"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d980cfa1ad7042e1bec5ed9b6c1567ef2bdbec7018ec11580a4bfa6a404d7e1d\"" Apr 12 19:01:43.163670 env[1135]: time="2024-04-12T19:01:43.163629769Z" level=info msg="StartContainer for \"d980cfa1ad7042e1bec5ed9b6c1567ef2bdbec7018ec11580a4bfa6a404d7e1d\"" Apr 12 19:01:43.219080 systemd[1]: Started cri-containerd-d980cfa1ad7042e1bec5ed9b6c1567ef2bdbec7018ec11580a4bfa6a404d7e1d.scope. Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f70a77dfa28 items=0 ppid=3566 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:43.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383063666131616437303432653162656335656439623663313536 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.261000 audit: BPF prog-id=186 op=LOAD Apr 12 19:01:43.261000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e7f88 items=0 ppid=3566 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:43.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383063666131616437303432653162656335656439623663313536 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit: BPF prog-id=187 op=LOAD Apr 12 19:01:43.262000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e7fd8 items=0 ppid=3566 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:43.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383063666131616437303432653162656335656439623663313536 Apr 12 19:01:43.262000 audit: BPF prog-id=187 op=UNLOAD Apr 12 19:01:43.262000 audit: BPF prog-id=186 op=UNLOAD Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:43.262000 audit: BPF prog-id=188 op=LOAD Apr 12 19:01:43.262000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c2068 items=0 ppid=3566 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:43.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383063666131616437303432653162656335656439623663313536 Apr 12 19:01:43.289943 env[1135]: time="2024-04-12T19:01:43.289871189Z" level=info msg="StartContainer for \"d980cfa1ad7042e1bec5ed9b6c1567ef2bdbec7018ec11580a4bfa6a404d7e1d\" returns successfully" Apr 12 19:01:43.492969 kubelet[2064]: I0412 19:01:43.492819 2064 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:01:43.492969 kubelet[2064]: I0412 19:01:43.492887 2064 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:01:43.645266 kubelet[2064]: I0412 19:01:43.645210 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-9grsh" podStartSLOduration=27.799579478 podStartE2EDuration="33.645138609s" podCreationTimestamp="2024-04-12 19:01:10 +0000 UTC" firstStartedPulling="2024-04-12 19:01:37.283686615 +0000 UTC m=+48.243261154" lastFinishedPulling="2024-04-12 19:01:43.12924574 +0000 UTC m=+54.088820285" observedRunningTime="2024-04-12 19:01:43.64301384 +0000 UTC m=+54.602588430" watchObservedRunningTime="2024-04-12 19:01:43.645138609 +0000 UTC m=+54.604713159" Apr 12 19:01:45.525000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.525000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f5e8c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:45.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:45.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6e10 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:01:45.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:01:45.592127 kubelet[2064]: I0412 19:01:45.592073 2064 topology_manager.go:215] "Topology Admit Handler" podUID="ada4a421-7736-4f08-84d2-632297ce3e62" podNamespace="calico-apiserver" podName="calico-apiserver-fc6f89688-jbsqm" Apr 12 19:01:45.601042 systemd[1]: Created slice kubepods-besteffort-podada4a421_7736_4f08_84d2_632297ce3e62.slice. Apr 12 19:01:45.626077 kubelet[2064]: I0412 19:01:45.626033 2064 topology_manager.go:215] "Topology Admit Handler" podUID="a89e9052-6aee-4606-9b85-2139871edbb1" podNamespace="calico-apiserver" podName="calico-apiserver-fc6f89688-r8945" Apr 12 19:01:45.638355 systemd[1]: Created slice kubepods-besteffort-poda89e9052_6aee_4606_9b85_2139871edbb1.slice. Apr 12 19:01:45.678000 audit[3988]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:45.678000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc6fe415c0 a2=0 a3=7ffc6fe415ac items=0 ppid=2233 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:45.680000 audit[3988]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:45.680000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc6fe415c0 a2=0 a3=7ffc6fe415ac items=0 ppid=2233 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:45.695000 audit[3990]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:45.695000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdd9a426d0 a2=0 a3=7ffdd9a426bc items=0 ppid=2233 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:45.698000 audit[3990]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:45.698000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdd9a426d0 a2=0 a3=7ffdd9a426bc items=0 ppid=2233 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:45.740953 kubelet[2064]: I0412 19:01:45.740882 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a89e9052-6aee-4606-9b85-2139871edbb1-calico-apiserver-certs\") pod \"calico-apiserver-fc6f89688-r8945\" (UID: \"a89e9052-6aee-4606-9b85-2139871edbb1\") " pod="calico-apiserver/calico-apiserver-fc6f89688-r8945" Apr 12 19:01:45.740953 kubelet[2064]: I0412 19:01:45.740957 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ada4a421-7736-4f08-84d2-632297ce3e62-calico-apiserver-certs\") pod \"calico-apiserver-fc6f89688-jbsqm\" (UID: \"ada4a421-7736-4f08-84d2-632297ce3e62\") " pod="calico-apiserver/calico-apiserver-fc6f89688-jbsqm" Apr 12 19:01:45.741279 kubelet[2064]: I0412 19:01:45.741013 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-492dz\" (UniqueName: \"kubernetes.io/projected/ada4a421-7736-4f08-84d2-632297ce3e62-kube-api-access-492dz\") pod \"calico-apiserver-fc6f89688-jbsqm\" (UID: \"ada4a421-7736-4f08-84d2-632297ce3e62\") " pod="calico-apiserver/calico-apiserver-fc6f89688-jbsqm" Apr 12 19:01:45.741279 kubelet[2064]: I0412 19:01:45.741046 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tb5t6\" (UniqueName: \"kubernetes.io/projected/a89e9052-6aee-4606-9b85-2139871edbb1-kube-api-access-tb5t6\") pod \"calico-apiserver-fc6f89688-r8945\" (UID: \"a89e9052-6aee-4606-9b85-2139871edbb1\") " pod="calico-apiserver/calico-apiserver-fc6f89688-r8945" Apr 12 19:01:45.790000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.790000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00d5925a0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.790000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.790000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.790000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00e456fa0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.790000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.791000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.791000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00d592600 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.792000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.792000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e456fe0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.792000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.797000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.797000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00d5926c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.813000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:01:45.813000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00df22de0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:01:45.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:01:45.842599 kubelet[2064]: E0412 19:01:45.842555 2064 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:01:45.843318 kubelet[2064]: E0412 19:01:45.843291 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ada4a421-7736-4f08-84d2-632297ce3e62-calico-apiserver-certs podName:ada4a421-7736-4f08-84d2-632297ce3e62 nodeName:}" failed. No retries permitted until 2024-04-12 19:01:46.343259826 +0000 UTC m=+57.302834373 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ada4a421-7736-4f08-84d2-632297ce3e62-calico-apiserver-certs") pod "calico-apiserver-fc6f89688-jbsqm" (UID: "ada4a421-7736-4f08-84d2-632297ce3e62") : secret "calico-apiserver-certs" not found Apr 12 19:01:45.843892 kubelet[2064]: E0412 19:01:45.842938 2064 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:01:45.844112 kubelet[2064]: E0412 19:01:45.844092 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a89e9052-6aee-4606-9b85-2139871edbb1-calico-apiserver-certs podName:a89e9052-6aee-4606-9b85-2139871edbb1 nodeName:}" failed. No retries permitted until 2024-04-12 19:01:46.344066946 +0000 UTC m=+57.303641487 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/a89e9052-6aee-4606-9b85-2139871edbb1-calico-apiserver-certs") pod "calico-apiserver-fc6f89688-r8945" (UID: "a89e9052-6aee-4606-9b85-2139871edbb1") : secret "calico-apiserver-certs" not found Apr 12 19:01:46.346086 kubelet[2064]: E0412 19:01:46.346027 2064 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:01:46.346343 kubelet[2064]: E0412 19:01:46.346144 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ada4a421-7736-4f08-84d2-632297ce3e62-calico-apiserver-certs podName:ada4a421-7736-4f08-84d2-632297ce3e62 nodeName:}" failed. No retries permitted until 2024-04-12 19:01:47.346118653 +0000 UTC m=+58.305693198 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ada4a421-7736-4f08-84d2-632297ce3e62-calico-apiserver-certs") pod "calico-apiserver-fc6f89688-jbsqm" (UID: "ada4a421-7736-4f08-84d2-632297ce3e62") : secret "calico-apiserver-certs" not found Apr 12 19:01:46.346590 kubelet[2064]: E0412 19:01:46.346027 2064 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:01:46.346831 kubelet[2064]: E0412 19:01:46.346783 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a89e9052-6aee-4606-9b85-2139871edbb1-calico-apiserver-certs podName:a89e9052-6aee-4606-9b85-2139871edbb1 nodeName:}" failed. No retries permitted until 2024-04-12 19:01:47.346755158 +0000 UTC m=+58.306329701 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/a89e9052-6aee-4606-9b85-2139871edbb1-calico-apiserver-certs") pod "calico-apiserver-fc6f89688-r8945" (UID: "a89e9052-6aee-4606-9b85-2139871edbb1") : secret "calico-apiserver-certs" not found Apr 12 19:01:47.414865 env[1135]: time="2024-04-12T19:01:47.414794162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fc6f89688-jbsqm,Uid:ada4a421-7736-4f08-84d2-632297ce3e62,Namespace:calico-apiserver,Attempt:0,}" Apr 12 19:01:47.453596 env[1135]: time="2024-04-12T19:01:47.452771524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fc6f89688-r8945,Uid:a89e9052-6aee-4606-9b85-2139871edbb1,Namespace:calico-apiserver,Attempt:0,}" Apr 12 19:01:47.731038 systemd-networkd[1023]: calie3976fc157a: Link UP Apr 12 19:01:47.747310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:01:47.751907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3976fc157a: link becomes ready Apr 12 19:01:47.753091 systemd-networkd[1023]: calie3976fc157a: Gained carrier Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.545 [INFO][4006] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0 calico-apiserver-fc6f89688- calico-apiserver ada4a421-7736-4f08-84d2-632297ce3e62 807 0 2024-04-12 19:01:45 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:fc6f89688 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal calico-apiserver-fc6f89688-jbsqm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie3976fc157a [] []}} ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.546 [INFO][4006] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.646 [INFO][4028] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" HandleID="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.663 [INFO][4028] ipam_plugin.go 268: Auto assigning IP ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" HandleID="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000275430), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"calico-apiserver-fc6f89688-jbsqm", "timestamp":"2024-04-12 19:01:47.646404046 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.663 [INFO][4028] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.663 [INFO][4028] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.663 [INFO][4028] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.665 [INFO][4028] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.671 [INFO][4028] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.683 [INFO][4028] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.689 [INFO][4028] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.694 [INFO][4028] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.697 [INFO][4028] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.701 [INFO][4028] ipam.go 1682: Creating new handle: k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.709 [INFO][4028] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.716 [INFO][4028] ipam.go 1216: Successfully claimed IPs: [192.168.90.69/26] block=192.168.90.64/26 handle="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.716 [INFO][4028] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.69/26] handle="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.716 [INFO][4028] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:47.768626 env[1135]: 2024-04-12 19:01:47.716 [INFO][4028] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.69/26] IPv6=[] ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" HandleID="k8s-pod-network.e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.718 [INFO][4006] k8s.go 385: Populated endpoint ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0", GenerateName:"calico-apiserver-fc6f89688-", Namespace:"calico-apiserver", SelfLink:"", UID:"ada4a421-7736-4f08-84d2-632297ce3e62", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fc6f89688", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-fc6f89688-jbsqm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3976fc157a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.718 [INFO][4006] k8s.go 386: Calico CNI using IPs: [192.168.90.69/32] ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.718 [INFO][4006] dataplane_linux.go 68: Setting the host side veth name to calie3976fc157a ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.754 [INFO][4006] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.755 [INFO][4006] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0", GenerateName:"calico-apiserver-fc6f89688-", Namespace:"calico-apiserver", SelfLink:"", UID:"ada4a421-7736-4f08-84d2-632297ce3e62", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fc6f89688", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c", Pod:"calico-apiserver-fc6f89688-jbsqm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3976fc157a", MAC:"fa:c3:51:52:94:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:47.770019 env[1135]: 2024-04-12 19:01:47.764 [INFO][4006] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-jbsqm" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--jbsqm-eth0" Apr 12 19:01:47.810882 env[1135]: time="2024-04-12T19:01:47.810780733Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:47.811247 env[1135]: time="2024-04-12T19:01:47.811191071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:47.811459 env[1135]: time="2024-04-12T19:01:47.811412121Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:47.811927 env[1135]: time="2024-04-12T19:01:47.811865407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c pid=4061 runtime=io.containerd.runc.v2 Apr 12 19:01:47.861681 systemd-networkd[1023]: calic21215bc053: Link UP Apr 12 19:01:47.871953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic21215bc053: link becomes ready Apr 12 19:01:47.873000 systemd-networkd[1023]: calic21215bc053: Gained carrier Apr 12 19:01:47.879390 systemd[1]: Started cri-containerd-e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c.scope. Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.607 [INFO][4017] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0 calico-apiserver-fc6f89688- calico-apiserver a89e9052-6aee-4606-9b85-2139871edbb1 809 0 2024-04-12 19:01:45 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:fc6f89688 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal calico-apiserver-fc6f89688-r8945 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic21215bc053 [] []}} ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.608 [INFO][4017] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.692 [INFO][4034] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" HandleID="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.707 [INFO][4034] ipam_plugin.go 268: Auto assigning IP ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" HandleID="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000119d20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", "pod":"calico-apiserver-fc6f89688-r8945", "timestamp":"2024-04-12 19:01:47.692823432 +0000 UTC"}, Hostname:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.707 [INFO][4034] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.717 [INFO][4034] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.717 [INFO][4034] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal' Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.741 [INFO][4034] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.757 [INFO][4034] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.762 [INFO][4034] ipam.go 489: Trying affinity for 192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.773 [INFO][4034] ipam.go 155: Attempting to load block cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.782 [INFO][4034] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.64/26 host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.782 [INFO][4034] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.64/26 handle="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.786 [INFO][4034] ipam.go 1682: Creating new handle: k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.801 [INFO][4034] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.64/26 handle="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.839 [INFO][4034] ipam.go 1216: Successfully claimed IPs: [192.168.90.70/26] block=192.168.90.64/26 handle="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.839 [INFO][4034] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.70/26] handle="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" host="ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal" Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.839 [INFO][4034] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:47.901546 env[1135]: 2024-04-12 19:01:47.839 [INFO][4034] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.70/26] IPv6=[] ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" HandleID="k8s-pod-network.2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.846 [INFO][4017] k8s.go 385: Populated endpoint ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0", GenerateName:"calico-apiserver-fc6f89688-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89e9052-6aee-4606-9b85-2139871edbb1", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fc6f89688", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-fc6f89688-r8945", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic21215bc053", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.846 [INFO][4017] k8s.go 386: Calico CNI using IPs: [192.168.90.70/32] ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.846 [INFO][4017] dataplane_linux.go 68: Setting the host side veth name to calic21215bc053 ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.878 [INFO][4017] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.879 [INFO][4017] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0", GenerateName:"calico-apiserver-fc6f89688-", Namespace:"calico-apiserver", SelfLink:"", UID:"a89e9052-6aee-4606-9b85-2139871edbb1", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fc6f89688", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e", Pod:"calico-apiserver-fc6f89688-r8945", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.90.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic21215bc053", MAC:"de:98:86:53:fe:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:47.903045 env[1135]: 2024-04-12 19:01:47.898 [INFO][4017] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e" Namespace="calico-apiserver" Pod="calico-apiserver-fc6f89688-r8945" WorkloadEndpoint="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--apiserver--fc6f89688--r8945-eth0" Apr 12 19:01:47.946283 env[1135]: time="2024-04-12T19:01:47.946164848Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:47.946661 env[1135]: time="2024-04-12T19:01:47.946569750Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:47.946958 env[1135]: time="2024-04-12T19:01:47.946907122Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:47.947654 env[1135]: time="2024-04-12T19:01:47.947560137Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e pid=4103 runtime=io.containerd.runc.v2 Apr 12 19:01:47.984029 systemd[1]: Started cri-containerd-2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e.scope. Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.999184 kernel: kauditd_printk_skb: 126 callbacks suppressed Apr 12 19:01:47.999286 kernel: audit: type=1400 audit(1712948507.991:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040645 kernel: audit: type=1400 audit(1712948507.991:1372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.070544 kernel: audit: type=1400 audit(1712948507.991:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.101626 kernel: audit: type=1400 audit(1712948507.991:1374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.133539 kernel: audit: type=1400 audit(1712948507.991:1375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.149467 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:48.149636 kernel: audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:48.149685 kernel: audit: backlog limit exceeded Apr 12 19:01:48.159566 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:48.159686 kernel: audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.991000 audit: BPF prog-id=189 op=LOAD Apr 12 19:01:48.018000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.018000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4061 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653736613937343533333234336436336230373530393533633138 Apr 12 19:01:48.018000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.018000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4061 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653736613937343533333234336436336230373530393533633138 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.023000 audit: BPF prog-id=190 op=LOAD Apr 12 19:01:48.023000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000229300 items=0 ppid=4061 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653736613937343533333234336436336230373530393533633138 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.040000 audit: BPF prog-id=191 op=LOAD Apr 12 19:01:48.040000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229348 items=0 ppid=4061 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653736613937343533333234336436336230373530393533633138 Apr 12 19:01:48.045000 audit: BPF prog-id=191 op=UNLOAD Apr 12 19:01:48.045000 audit: BPF prog-id=190 op=UNLOAD Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.045000 audit: BPF prog-id=192 op=LOAD Apr 12 19:01:48.045000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000229758 items=0 ppid=4061 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533653736613937343533333234336436336230373530393533633138 Apr 12 19:01:48.079000 audit[4130]: NETFILTER_CFG table=filter:115 family=2 entries=55 op=nft_register_chain pid=4130 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:48.079000 audit[4130]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7ffe1fd85610 a2=0 a3=7ffe1fd855fc items=0 ppid=3279 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:48.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.165000 audit: BPF prog-id=193 op=LOAD Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4103 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265666661653734343961633463623335663065326631396435303763 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4103 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265666661653734343961633463623335663065326631396435303763 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit: BPF prog-id=194 op=LOAD Apr 12 19:01:48.168000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9ca0 items=0 ppid=4103 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265666661653734343961633463623335663065326631396435303763 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.168000 audit: BPF prog-id=195 op=LOAD Apr 12 19:01:48.168000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9ce8 items=0 ppid=4103 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265666661653734343961633463623335663065326631396435303763 Apr 12 19:01:48.168000 audit: BPF prog-id=195 op=UNLOAD Apr 12 19:01:48.168000 audit: BPF prog-id=194 op=UNLOAD Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.169000 audit: BPF prog-id=196 op=LOAD Apr 12 19:01:48.169000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c00f8 items=0 ppid=4103 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265666661653734343961633463623335663065326631396435303763 Apr 12 19:01:48.201026 env[1135]: time="2024-04-12T19:01:48.200963758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fc6f89688-jbsqm,Uid:ada4a421-7736-4f08-84d2-632297ce3e62,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c\"" Apr 12 19:01:48.204801 env[1135]: time="2024-04-12T19:01:48.204762952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 19:01:48.257000 audit[4146]: NETFILTER_CFG table=filter:116 family=2 entries=46 op=nft_register_chain pid=4146 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:01:48.257000 audit[4146]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffe4dc25ca0 a2=0 a3=7ffe4dc25c8c items=0 ppid=3279 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:48.257000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:01:48.284626 env[1135]: time="2024-04-12T19:01:48.284546613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fc6f89688-r8945,Uid:a89e9052-6aee-4606-9b85-2139871edbb1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e\"" Apr 12 19:01:49.097125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1825538374.mount: Deactivated successfully. Apr 12 19:01:49.200710 systemd-networkd[1023]: calie3976fc157a: Gained IPv6LL Apr 12 19:01:49.262562 env[1135]: time="2024-04-12T19:01:49.262031892Z" level=info msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" Apr 12 19:01:49.392763 systemd-networkd[1023]: calic21215bc053: Gained IPv6LL Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.428 [WARNING][4168] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a", Pod:"csi-node-driver-9grsh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7443bcb6adc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.429 [INFO][4168] k8s.go 585: Cleaning up netns ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.429 [INFO][4168] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" iface="eth0" netns="" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.429 [INFO][4168] k8s.go 592: Releasing IP address(es) ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.429 [INFO][4168] utils.go 188: Calico CNI releasing IP address ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.543 [INFO][4174] ipam_plugin.go 415: Releasing address using handleID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.544 [INFO][4174] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.544 [INFO][4174] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.560 [WARNING][4174] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.560 [INFO][4174] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.565 [INFO][4174] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:49.569938 env[1135]: 2024-04-12 19:01:49.567 [INFO][4168] k8s.go 598: Teardown processing complete. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.571076 env[1135]: time="2024-04-12T19:01:49.571010787Z" level=info msg="TearDown network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" successfully" Apr 12 19:01:49.571226 env[1135]: time="2024-04-12T19:01:49.571195949Z" level=info msg="StopPodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" returns successfully" Apr 12 19:01:49.572207 env[1135]: time="2024-04-12T19:01:49.572168330Z" level=info msg="RemovePodSandbox for \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" Apr 12 19:01:49.572460 env[1135]: time="2024-04-12T19:01:49.572384450Z" level=info msg="Forcibly stopping sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\"" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.730 [WARNING][4195] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2389d86-7c35-4d5a-8e9a-d6d0f6f56391", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"88561a4d91319a2d0c13f2f589b7dbc9aeaa220f695a0cb3b9a4ffa1799d5a4a", Pod:"csi-node-driver-9grsh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7443bcb6adc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.731 [INFO][4195] k8s.go 585: Cleaning up netns ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.731 [INFO][4195] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" iface="eth0" netns="" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.731 [INFO][4195] k8s.go 592: Releasing IP address(es) ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.731 [INFO][4195] utils.go 188: Calico CNI releasing IP address ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.798 [INFO][4203] ipam_plugin.go 415: Releasing address using handleID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.798 [INFO][4203] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.799 [INFO][4203] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.821 [WARNING][4203] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.821 [INFO][4203] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" HandleID="k8s-pod-network.2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-csi--node--driver--9grsh-eth0" Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.823 [INFO][4203] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:49.829448 env[1135]: 2024-04-12 19:01:49.827 [INFO][4195] k8s.go 598: Teardown processing complete. ContainerID="2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86" Apr 12 19:01:49.830346 env[1135]: time="2024-04-12T19:01:49.829499307Z" level=info msg="TearDown network for sandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" successfully" Apr 12 19:01:49.843083 env[1135]: time="2024-04-12T19:01:49.843022691Z" level=info msg="RemovePodSandbox \"2e3326477f932b3f7335d248fcae7a1b425cdb4d184a81f65a9c33efc3d12f86\" returns successfully" Apr 12 19:01:49.843999 env[1135]: time="2024-04-12T19:01:49.843941132Z" level=info msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:49.970 [WARNING][4225] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d4fb8ca4-5089-4763-867c-0feae5c722e4", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6", Pod:"coredns-76f75df574-kt8d8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6399146e16e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:49.970 [INFO][4225] k8s.go 585: Cleaning up netns ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:49.971 [INFO][4225] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" iface="eth0" netns="" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:49.971 [INFO][4225] k8s.go 592: Releasing IP address(es) ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:49.971 [INFO][4225] utils.go 188: Calico CNI releasing IP address ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.053 [INFO][4231] ipam_plugin.go 415: Releasing address using handleID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.053 [INFO][4231] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.054 [INFO][4231] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.064 [WARNING][4231] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.065 [INFO][4231] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.067 [INFO][4231] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:50.078297 env[1135]: 2024-04-12 19:01:50.073 [INFO][4225] k8s.go 598: Teardown processing complete. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.079369 env[1135]: time="2024-04-12T19:01:50.078352194Z" level=info msg="TearDown network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" successfully" Apr 12 19:01:50.079369 env[1135]: time="2024-04-12T19:01:50.078409363Z" level=info msg="StopPodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" returns successfully" Apr 12 19:01:50.079369 env[1135]: time="2024-04-12T19:01:50.079305235Z" level=info msg="RemovePodSandbox for \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" Apr 12 19:01:50.081539 env[1135]: time="2024-04-12T19:01:50.079354790Z" level=info msg="Forcibly stopping sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\"" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.195 [WARNING][4252] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d4fb8ca4-5089-4763-867c-0feae5c722e4", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"ac2b9b832a84f1046bd64bab7cf694a9504b9ab24d7afc5966b5ec032d1f2da6", Pod:"coredns-76f75df574-kt8d8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6399146e16e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.196 [INFO][4252] k8s.go 585: Cleaning up netns ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.196 [INFO][4252] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" iface="eth0" netns="" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.196 [INFO][4252] k8s.go 592: Releasing IP address(es) ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.196 [INFO][4252] utils.go 188: Calico CNI releasing IP address ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.248 [INFO][4258] ipam_plugin.go 415: Releasing address using handleID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.248 [INFO][4258] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.248 [INFO][4258] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.261 [WARNING][4258] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.262 [INFO][4258] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" HandleID="k8s-pod-network.4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--kt8d8-eth0" Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.264 [INFO][4258] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:50.280334 env[1135]: 2024-04-12 19:01:50.266 [INFO][4252] k8s.go 598: Teardown processing complete. ContainerID="4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e" Apr 12 19:01:50.281881 env[1135]: time="2024-04-12T19:01:50.281825546Z" level=info msg="TearDown network for sandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" successfully" Apr 12 19:01:50.293839 env[1135]: time="2024-04-12T19:01:50.293780408Z" level=info msg="RemovePodSandbox \"4157ec4a15b16193b8a09151dceed14b9e0dc8b38cc9d4c43e93cdc534206b4e\" returns successfully" Apr 12 19:01:50.294680 env[1135]: time="2024-04-12T19:01:50.294634493Z" level=info msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" Apr 12 19:01:50.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.14:22-139.178.89.65:57656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:50.451989 systemd[1]: Started sshd@7-10.128.0.14:22-139.178.89.65:57656.service. Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.528 [WARNING][4277] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0", GenerateName:"calico-kube-controllers-65c69bc647-", Namespace:"calico-system", SelfLink:"", UID:"3634e9ed-6def-4574-bb6c-0144a963d7b1", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c69bc647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827", Pod:"calico-kube-controllers-65c69bc647-v6x6p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali715eb8b36ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.528 [INFO][4277] k8s.go 585: Cleaning up netns ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.528 [INFO][4277] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" iface="eth0" netns="" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.529 [INFO][4277] k8s.go 592: Releasing IP address(es) ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.529 [INFO][4277] utils.go 188: Calico CNI releasing IP address ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.672 [INFO][4287] ipam_plugin.go 415: Releasing address using handleID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.682 [INFO][4287] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.682 [INFO][4287] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.708 [WARNING][4287] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.708 [INFO][4287] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.715 [INFO][4287] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:50.720569 env[1135]: 2024-04-12 19:01:50.717 [INFO][4277] k8s.go 598: Teardown processing complete. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.720569 env[1135]: time="2024-04-12T19:01:50.719830220Z" level=info msg="TearDown network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" successfully" Apr 12 19:01:50.720569 env[1135]: time="2024-04-12T19:01:50.719883366Z" level=info msg="StopPodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" returns successfully" Apr 12 19:01:50.721614 env[1135]: time="2024-04-12T19:01:50.721203136Z" level=info msg="RemovePodSandbox for \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" Apr 12 19:01:50.721614 env[1135]: time="2024-04-12T19:01:50.721272272Z" level=info msg="Forcibly stopping sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\"" Apr 12 19:01:50.835000 audit[4282]: USER_ACCT pid=4282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.839669 sshd[4282]: Accepted publickey for core from 139.178.89.65 port 57656 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:50.840000 audit[4282]: CRED_ACQ pid=4282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.840000 audit[4282]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe72ef4e10 a2=3 a3=0 items=0 ppid=1 pid=4282 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:50.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:01:50.841562 sshd[4282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:50.857416 systemd[1]: Started session-8.scope. Apr 12 19:01:50.859692 systemd-logind[1124]: New session 8 of user core. Apr 12 19:01:50.872000 audit[4282]: USER_START pid=4282 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.875000 audit[4312]: CRED_ACQ pid=4312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.900 [WARNING][4306] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0", GenerateName:"calico-kube-controllers-65c69bc647-", Namespace:"calico-system", SelfLink:"", UID:"3634e9ed-6def-4574-bb6c-0144a963d7b1", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c69bc647", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"822470c5640ab613f7a4ec4f414441b4d6c5c1e583db274f577981df1148c827", Pod:"calico-kube-controllers-65c69bc647-v6x6p", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali715eb8b36ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.900 [INFO][4306] k8s.go 585: Cleaning up netns ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.900 [INFO][4306] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" iface="eth0" netns="" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.900 [INFO][4306] k8s.go 592: Releasing IP address(es) ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.900 [INFO][4306] utils.go 188: Calico CNI releasing IP address ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.959 [INFO][4313] ipam_plugin.go 415: Releasing address using handleID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.960 [INFO][4313] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.960 [INFO][4313] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.972 [WARNING][4313] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.972 [INFO][4313] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" HandleID="k8s-pod-network.a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c69bc647--v6x6p-eth0" Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.974 [INFO][4313] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:50.977449 env[1135]: 2024-04-12 19:01:50.975 [INFO][4306] k8s.go 598: Teardown processing complete. ContainerID="a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34" Apr 12 19:01:50.980140 env[1135]: time="2024-04-12T19:01:50.977406892Z" level=info msg="TearDown network for sandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" successfully" Apr 12 19:01:50.986611 env[1135]: time="2024-04-12T19:01:50.986538949Z" level=info msg="RemovePodSandbox \"a0c595d09a27e2ad541d0d56dd41e0ec08dcceebe6ca324f2247c0ba041a5f34\" returns successfully" Apr 12 19:01:50.987337 env[1135]: time="2024-04-12T19:01:50.987288834Z" level=info msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.161 [WARNING][4333] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0da3af74-cfa5-44c0-b14a-620fc886fa93", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1", Pod:"coredns-76f75df574-9rjch", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif96994f7e88", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.162 [INFO][4333] k8s.go 585: Cleaning up netns ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.162 [INFO][4333] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" iface="eth0" netns="" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.162 [INFO][4333] k8s.go 592: Releasing IP address(es) ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.162 [INFO][4333] utils.go 188: Calico CNI releasing IP address ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.313 [INFO][4347] ipam_plugin.go 415: Releasing address using handleID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.314 [INFO][4347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.314 [INFO][4347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.330 [WARNING][4347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.330 [INFO][4347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.333 [INFO][4347] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:51.337202 env[1135]: 2024-04-12 19:01:51.334 [INFO][4333] k8s.go 598: Teardown processing complete. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.337202 env[1135]: time="2024-04-12T19:01:51.336177925Z" level=info msg="TearDown network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" successfully" Apr 12 19:01:51.337202 env[1135]: time="2024-04-12T19:01:51.336230924Z" level=info msg="StopPodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" returns successfully" Apr 12 19:01:51.338947 env[1135]: time="2024-04-12T19:01:51.338904032Z" level=info msg="RemovePodSandbox for \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" Apr 12 19:01:51.339187 env[1135]: time="2024-04-12T19:01:51.339126781Z" level=info msg="Forcibly stopping sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\"" Apr 12 19:01:51.380000 audit[4282]: USER_END pid=4282 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:51.380000 audit[4282]: CRED_DISP pid=4282 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:51.379566 sshd[4282]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:51.384141 systemd[1]: sshd@7-10.128.0.14:22-139.178.89.65:57656.service: Deactivated successfully. Apr 12 19:01:51.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.14:22-139.178.89.65:57656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:51.385483 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 19:01:51.388138 systemd-logind[1124]: Session 8 logged out. Waiting for processes to exit. Apr 12 19:01:51.391117 systemd-logind[1124]: Removed session 8. Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.471 [WARNING][4366] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0da3af74-cfa5-44c0-b14a-620fc886fa93", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-b98205159e691049233c.c.flatcar-212911.internal", ContainerID:"8bb2ddc3aab0dbd43d7b51fb1ea2e4acfefbda9b668febffd29b10025d5857b1", Pod:"coredns-76f75df574-9rjch", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif96994f7e88", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.471 [INFO][4366] k8s.go 585: Cleaning up netns ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.471 [INFO][4366] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" iface="eth0" netns="" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.471 [INFO][4366] k8s.go 592: Releasing IP address(es) ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.471 [INFO][4366] utils.go 188: Calico CNI releasing IP address ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.553 [INFO][4373] ipam_plugin.go 415: Releasing address using handleID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.554 [INFO][4373] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.554 [INFO][4373] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.564 [WARNING][4373] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.564 [INFO][4373] ipam_plugin.go 443: Releasing address using workloadID ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" HandleID="k8s-pod-network.531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Workload="ci--3510--3--3--b98205159e691049233c.c.flatcar--212911.internal-k8s-coredns--76f75df574--9rjch-eth0" Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.566 [INFO][4373] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:01:51.571863 env[1135]: 2024-04-12 19:01:51.568 [INFO][4366] k8s.go 598: Teardown processing complete. ContainerID="531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96" Apr 12 19:01:51.572951 env[1135]: time="2024-04-12T19:01:51.572889568Z" level=info msg="TearDown network for sandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" successfully" Apr 12 19:01:51.579587 env[1135]: time="2024-04-12T19:01:51.579506145Z" level=info msg="RemovePodSandbox \"531408c038f1578e0be5c44311907422beb5cbf521d6a6d7760601a672817f96\" returns successfully" Apr 12 19:01:52.052536 env[1135]: time="2024-04-12T19:01:52.052446574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.055634 env[1135]: time="2024-04-12T19:01:52.055565049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.058313 env[1135]: time="2024-04-12T19:01:52.058250819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.060959 env[1135]: time="2024-04-12T19:01:52.060903388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.061829 env[1135]: time="2024-04-12T19:01:52.061788768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 19:01:52.063460 env[1135]: time="2024-04-12T19:01:52.063409050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 19:01:52.065933 env[1135]: time="2024-04-12T19:01:52.065886680Z" level=info msg="CreateContainer within sandbox \"e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 19:01:52.095845 env[1135]: time="2024-04-12T19:01:52.095768824Z" level=info msg="CreateContainer within sandbox \"e3e76a974533243d63b0750953c18794b0885284bbeb1083d9e2b8548fcdb80c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248\"" Apr 12 19:01:52.096783 env[1135]: time="2024-04-12T19:01:52.096742735Z" level=info msg="StartContainer for \"a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248\"" Apr 12 19:01:52.100721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2887161505.mount: Deactivated successfully. Apr 12 19:01:52.162184 systemd[1]: Started cri-containerd-a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248.scope. Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit: BPF prog-id=197 op=LOAD Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4061 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663134373733646462646434653831663863326261386431343362 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4061 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663134373733646462646434653831663863326261386431343362 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit: BPF prog-id=198 op=LOAD Apr 12 19:01:52.198000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be140 items=0 ppid=4061 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663134373733646462646434653831663863326261386431343362 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.198000 audit: BPF prog-id=199 op=LOAD Apr 12 19:01:52.198000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001be188 items=0 ppid=4061 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663134373733646462646434653831663863326261386431343362 Apr 12 19:01:52.199000 audit: BPF prog-id=199 op=UNLOAD Apr 12 19:01:52.199000 audit: BPF prog-id=198 op=UNLOAD Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.199000 audit: BPF prog-id=200 op=LOAD Apr 12 19:01:52.199000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be598 items=0 ppid=4061 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663134373733646462646434653831663863326261386431343362 Apr 12 19:01:52.253270 env[1135]: time="2024-04-12T19:01:52.253195701Z" level=info msg="StartContainer for \"a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248\" returns successfully" Apr 12 19:01:52.277300 env[1135]: time="2024-04-12T19:01:52.277235155Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.282094 env[1135]: time="2024-04-12T19:01:52.282039282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.285685 env[1135]: time="2024-04-12T19:01:52.285642838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.289395 env[1135]: time="2024-04-12T19:01:52.289309071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.291892 env[1135]: time="2024-04-12T19:01:52.290794882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 19:01:52.298017 env[1135]: time="2024-04-12T19:01:52.297975005Z" level=info msg="CreateContainer within sandbox \"2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 19:01:52.319827 env[1135]: time="2024-04-12T19:01:52.319692400Z" level=info msg="CreateContainer within sandbox \"2effae7449ac4cb35f0e2f19d507c3e03667752bc15bffe4ffdbb6411849523e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13\"" Apr 12 19:01:52.321029 env[1135]: time="2024-04-12T19:01:52.320981430Z" level=info msg="StartContainer for \"a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13\"" Apr 12 19:01:52.360609 systemd[1]: Started cri-containerd-a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13.scope. Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit: BPF prog-id=201 op=LOAD Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4103 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636563633236613830643430663930353961333036336230623862 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4103 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636563633236613830643430663930353961333036336230623862 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.432000 audit: BPF prog-id=202 op=LOAD Apr 12 19:01:52.432000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020aa60 items=0 ppid=4103 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636563633236613830643430663930353961333036336230623862 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit: BPF prog-id=203 op=LOAD Apr 12 19:01:52.433000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020aaa8 items=0 ppid=4103 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636563633236613830643430663930353961333036336230623862 Apr 12 19:01:52.433000 audit: BPF prog-id=203 op=UNLOAD Apr 12 19:01:52.433000 audit: BPF prog-id=202 op=UNLOAD Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.433000 audit: BPF prog-id=204 op=LOAD Apr 12 19:01:52.433000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020aeb8 items=0 ppid=4103 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636563633236613830643430663930353961333036336230623862 Apr 12 19:01:52.489427 env[1135]: time="2024-04-12T19:01:52.489360732Z" level=info msg="StartContainer for \"a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13\" returns successfully" Apr 12 19:01:52.764708 kubelet[2064]: I0412 19:01:52.764656 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-fc6f89688-r8945" podStartSLOduration=3.7596373 podStartE2EDuration="7.764576279s" podCreationTimestamp="2024-04-12 19:01:45 +0000 UTC" firstStartedPulling="2024-04-12 19:01:48.287240551 +0000 UTC m=+59.246815093" lastFinishedPulling="2024-04-12 19:01:52.292179532 +0000 UTC m=+63.251754072" observedRunningTime="2024-04-12 19:01:52.760859261 +0000 UTC m=+63.720433807" watchObservedRunningTime="2024-04-12 19:01:52.764576279 +0000 UTC m=+63.724150826" Apr 12 19:01:52.812000 audit[4452]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:52.812000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd74090000 a2=0 a3=7ffd7408ffec items=0 ppid=2233 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:52.818000 audit[4452]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:52.818000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd74090000 a2=0 a3=7ffd7408ffec items=0 ppid=2233 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:52.847000 audit[4454]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:52.847000 audit[4454]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcc1c9e8c0 a2=0 a3=7ffcc1c9e8ac items=0 ppid=2233 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:52.854000 audit[4454]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:52.854000 audit[4454]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc1c9e8c0 a2=0 a3=7ffcc1c9e8ac items=0 ppid=2233 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:53.708584 kernel: kauditd_printk_skb: 255 callbacks suppressed Apr 12 19:01:53.708779 kernel: audit: type=1400 audit(1712948513.688:1454): avc: denied { watch } for pid=4433 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.3189118676/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c342 tclass=file permissive=0 Apr 12 19:01:53.688000 audit[4433]: AVC avc: denied { watch } for pid=4433 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.3189118676/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c342 tclass=file permissive=0 Apr 12 19:01:53.688000 audit[4433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c67220 a2=fc6 a3=0 items=0 ppid=4103 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 key=(null) Apr 12 19:01:53.757797 kernel: audit: type=1300 audit(1712948513.688:1454): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c67220 a2=fc6 a3=0 items=0 ppid=4103 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 key=(null) Apr 12 19:01:53.688000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:01:53.788231 kernel: audit: type=1327 audit(1712948513.688:1454): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:01:53.839205 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.UNWZpN.mount: Deactivated successfully. Apr 12 19:01:54.114000 audit[4396]: AVC avc: denied { watch } for pid=4396 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.4022320792/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c967 tclass=file permissive=0 Apr 12 19:01:54.146575 kernel: audit: type=1400 audit(1712948514.114:1455): avc: denied { watch } for pid=4396 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.4022320792/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c967 tclass=file permissive=0 Apr 12 19:01:54.146771 kernel: audit: type=1300 audit(1712948514.114:1455): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c38d40 a2=fc6 a3=0 items=0 ppid=4061 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 key=(null) Apr 12 19:01:54.114000 audit[4396]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c38d40 a2=fc6 a3=0 items=0 ppid=4061 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 key=(null) Apr 12 19:01:54.114000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:01:54.178552 kernel: audit: type=1327 audit(1712948514.114:1455): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:01:56.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.14:22-139.178.89.65:57672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:56.436005 systemd[1]: Started sshd@8-10.128.0.14:22-139.178.89.65:57672.service. Apr 12 19:01:56.462425 kernel: audit: type=1130 audit(1712948516.435:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.14:22-139.178.89.65:57672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:56.787000 audit[4479]: USER_ACCT pid=4479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:56.788128 sshd[4479]: Accepted publickey for core from 139.178.89.65 port 57672 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:56.818649 kernel: audit: type=1101 audit(1712948516.787:1457): pid=4479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:56.819686 sshd[4479]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:56.818000 audit[4479]: CRED_ACQ pid=4479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:56.828890 systemd[1]: Started session-9.scope. Apr 12 19:01:56.831016 systemd-logind[1124]: New session 9 of user core. Apr 12 19:01:56.861596 kernel: audit: type=1103 audit(1712948516.818:1458): pid=4479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:56.861763 kernel: audit: type=1006 audit(1712948516.818:1459): pid=4479 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 19:01:56.818000 audit[4479]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02b1d9b0 a2=3 a3=0 items=0 ppid=1 pid=4479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:56.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:01:56.840000 audit[4479]: USER_START pid=4479 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:56.844000 audit[4481]: CRED_ACQ pid=4481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:57.152129 sshd[4479]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:57.154000 audit[4479]: USER_END pid=4479 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:57.154000 audit[4479]: CRED_DISP pid=4479 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:57.157783 systemd[1]: sshd@8-10.128.0.14:22-139.178.89.65:57672.service: Deactivated successfully. Apr 12 19:01:57.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.14:22-139.178.89.65:57672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:57.159079 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 19:01:57.160120 systemd-logind[1124]: Session 9 logged out. Waiting for processes to exit. Apr 12 19:01:57.161464 systemd-logind[1124]: Removed session 9. Apr 12 19:02:00.540000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.547290 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 19:02:00.547466 kernel: audit: type=1400 audit(1712948520.540:1465): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.540000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a4b80 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.607662 kernel: audit: type=1300 audit(1712948520.540:1465): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a4b80 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.607857 kernel: audit: type=1327 audit(1712948520.540:1465): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.540000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.662066 kernel: audit: type=1400 audit(1712948520.546:1466): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.662259 kernel: audit: type=1300 audit(1712948520.546:1466): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a4d20 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a4d20 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.726130 kernel: audit: type=1327 audit(1712948520.546:1466): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.726338 kernel: audit: type=1400 audit(1712948520.547:1467): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.547000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.547000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026577c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.788670 kernel: audit: type=1300 audit(1712948520.547:1467): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026577c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.788907 kernel: audit: type=1327 audit(1712948520.547:1467): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.547000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:00.554000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.843710 kernel: audit: type=1400 audit(1712948520.554:1468): avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:00.554000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002657960 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:00.554000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:02.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.14:22-139.178.89.65:40126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:02.209836 systemd[1]: Started sshd@9-10.128.0.14:22-139.178.89.65:40126.service. Apr 12 19:02:02.554000 audit[4505]: USER_ACCT pid=4505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.556733 sshd[4505]: Accepted publickey for core from 139.178.89.65 port 40126 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:02.556000 audit[4505]: CRED_ACQ pid=4505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.556000 audit[4505]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc35918470 a2=3 a3=0 items=0 ppid=1 pid=4505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:02.556000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:02.559066 sshd[4505]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:02.566750 systemd[1]: Started session-10.scope. Apr 12 19:02:02.567366 systemd-logind[1124]: New session 10 of user core. Apr 12 19:02:02.575000 audit[4505]: USER_START pid=4505 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.577000 audit[4507]: CRED_ACQ pid=4507 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.902869 sshd[4505]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:02.903000 audit[4505]: USER_END pid=4505 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.904000 audit[4505]: CRED_DISP pid=4505 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:02.908496 systemd[1]: sshd@9-10.128.0.14:22-139.178.89.65:40126.service: Deactivated successfully. Apr 12 19:02:02.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.14:22-139.178.89.65:40126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:02.909764 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 19:02:02.910288 systemd-logind[1124]: Session 10 logged out. Waiting for processes to exit. Apr 12 19:02:02.911689 systemd-logind[1124]: Removed session 10. Apr 12 19:02:02.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.14:22-139.178.89.65:40142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:02.959308 systemd[1]: Started sshd@10-10.128.0.14:22-139.178.89.65:40142.service. Apr 12 19:02:03.305000 audit[4518]: USER_ACCT pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.306960 sshd[4518]: Accepted publickey for core from 139.178.89.65 port 40142 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:03.306000 audit[4518]: CRED_ACQ pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.307000 audit[4518]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd400cb980 a2=3 a3=0 items=0 ppid=1 pid=4518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:03.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:03.309495 sshd[4518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:03.315586 systemd-logind[1124]: New session 11 of user core. Apr 12 19:02:03.316704 systemd[1]: Started session-11.scope. Apr 12 19:02:03.324000 audit[4518]: USER_START pid=4518 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.327000 audit[4520]: CRED_ACQ pid=4520 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.707956 sshd[4518]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:03.708000 audit[4518]: USER_END pid=4518 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.709000 audit[4518]: CRED_DISP pid=4518 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:03.713367 systemd-logind[1124]: Session 11 logged out. Waiting for processes to exit. Apr 12 19:02:03.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.14:22-139.178.89.65:40142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:03.713872 systemd[1]: sshd@10-10.128.0.14:22-139.178.89.65:40142.service: Deactivated successfully. Apr 12 19:02:03.715193 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 19:02:03.716644 systemd-logind[1124]: Removed session 11. Apr 12 19:02:03.764451 systemd[1]: Started sshd@11-10.128.0.14:22-139.178.89.65:40146.service. Apr 12 19:02:03.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.14:22-139.178.89.65:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:04.110000 audit[4527]: USER_ACCT pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.111133 sshd[4527]: Accepted publickey for core from 139.178.89.65 port 40146 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:04.112000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.112000 audit[4527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeded847a0 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:04.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:04.113221 sshd[4527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:04.120611 systemd-logind[1124]: New session 12 of user core. Apr 12 19:02:04.120665 systemd[1]: Started session-12.scope. Apr 12 19:02:04.129000 audit[4527]: USER_START pid=4527 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.131000 audit[4529]: CRED_ACQ pid=4529 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.448000 audit[4527]: USER_END pid=4527 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.448000 audit[4527]: CRED_DISP pid=4527 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:04.446470 sshd[4527]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:04.452325 systemd[1]: sshd@11-10.128.0.14:22-139.178.89.65:40146.service: Deactivated successfully. Apr 12 19:02:04.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.14:22-139.178.89.65:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:04.453661 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 19:02:04.454675 systemd-logind[1124]: Session 12 logged out. Waiting for processes to exit. Apr 12 19:02:04.456394 systemd-logind[1124]: Removed session 12. Apr 12 19:02:09.535136 kernel: kauditd_printk_skb: 35 callbacks suppressed Apr 12 19:02:09.535933 kernel: audit: type=1130 audit(1712948529.502:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.14:22-139.178.89.65:38456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:09.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.14:22-139.178.89.65:38456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:09.503434 systemd[1]: Started sshd@12-10.128.0.14:22-139.178.89.65:38456.service. Apr 12 19:02:09.849000 audit[4548]: USER_ACCT pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:09.880990 sshd[4548]: Accepted publickey for core from 139.178.89.65 port 38456 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:09.881565 kernel: audit: type=1101 audit(1712948529.849:1497): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:09.882292 sshd[4548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:09.880000 audit[4548]: CRED_ACQ pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:09.890818 systemd[1]: Started session-13.scope. Apr 12 19:02:09.892235 systemd-logind[1124]: New session 13 of user core. Apr 12 19:02:09.912545 kernel: audit: type=1103 audit(1712948529.880:1498): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:09.880000 audit[4548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9341140 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:09.965235 kernel: audit: type=1006 audit(1712948529.880:1499): pid=4548 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 19:02:09.965454 kernel: audit: type=1300 audit(1712948529.880:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9341140 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:09.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:09.912000 audit[4548]: USER_START pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.009605 kernel: audit: type=1327 audit(1712948529.880:1499): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:10.009794 kernel: audit: type=1105 audit(1712948529.912:1500): pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.009864 kernel: audit: type=1103 audit(1712948529.915:1501): pid=4570 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:09.915000 audit[4570]: CRED_ACQ pid=4570 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.203709 sshd[4548]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:10.205000 audit[4548]: USER_END pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.209722 systemd-logind[1124]: Session 13 logged out. Waiting for processes to exit. Apr 12 19:02:10.212323 systemd[1]: sshd@12-10.128.0.14:22-139.178.89.65:38456.service: Deactivated successfully. Apr 12 19:02:10.213604 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 19:02:10.216369 systemd-logind[1124]: Removed session 13. Apr 12 19:02:10.242742 kernel: audit: type=1106 audit(1712948530.205:1502): pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.242935 kernel: audit: type=1104 audit(1712948530.205:1503): pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.205000 audit[4548]: CRED_DISP pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:10.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.14:22-139.178.89.65:38456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:14.330723 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.DkBHPS.mount: Deactivated successfully. Apr 12 19:02:15.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.14:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:15.261247 systemd[1]: Started sshd@13-10.128.0.14:22-139.178.89.65:38468.service. Apr 12 19:02:15.267098 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:02:15.267221 kernel: audit: type=1130 audit(1712948535.261:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.14:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:15.610000 audit[4604]: USER_ACCT pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.613192 sshd[4604]: Accepted publickey for core from 139.178.89.65 port 38468 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:15.641565 kernel: audit: type=1101 audit(1712948535.610:1506): pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.641729 kernel: audit: type=1103 audit(1712948535.640:1507): pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.640000 audit[4604]: CRED_ACQ pid=4604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.642358 sshd[4604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:15.651699 systemd[1]: Started session-14.scope. Apr 12 19:02:15.653774 systemd-logind[1124]: New session 14 of user core. Apr 12 19:02:15.683993 kernel: audit: type=1006 audit(1712948535.640:1508): pid=4604 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 19:02:15.640000 audit[4604]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee55945d0 a2=3 a3=0 items=0 ppid=1 pid=4604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:15.712544 kernel: audit: type=1300 audit(1712948535.640:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee55945d0 a2=3 a3=0 items=0 ppid=1 pid=4604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:15.640000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:15.722676 kernel: audit: type=1327 audit(1712948535.640:1508): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:15.722798 kernel: audit: type=1105 audit(1712948535.663:1509): pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.663000 audit[4604]: USER_START pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.666000 audit[4606]: CRED_ACQ pid=4606 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.755551 kernel: audit: type=1103 audit(1712948535.666:1510): pid=4606 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.942701 sshd[4604]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:15.944000 audit[4604]: USER_END pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.950627 systemd[1]: sshd@13-10.128.0.14:22-139.178.89.65:38468.service: Deactivated successfully. Apr 12 19:02:15.952011 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 19:02:15.953986 systemd-logind[1124]: Session 14 logged out. Waiting for processes to exit. Apr 12 19:02:15.955570 systemd-logind[1124]: Removed session 14. Apr 12 19:02:15.944000 audit[4604]: CRED_DISP pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:16.001529 kernel: audit: type=1106 audit(1712948535.944:1511): pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:16.001672 kernel: audit: type=1104 audit(1712948535.944:1512): pid=4604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:15.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.14:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:17.462954 systemd[1]: run-containerd-runc-k8s.io-a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248-runc.ergpJn.mount: Deactivated successfully. Apr 12 19:02:17.505224 systemd[1]: run-containerd-runc-k8s.io-a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13-runc.wKwfoj.mount: Deactivated successfully. Apr 12 19:02:17.563682 kubelet[2064]: I0412 19:02:17.563627 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-fc6f89688-jbsqm" podStartSLOduration=28.705222914 podStartE2EDuration="32.563560389s" podCreationTimestamp="2024-04-12 19:01:45 +0000 UTC" firstStartedPulling="2024-04-12 19:01:48.203975064 +0000 UTC m=+59.163549597" lastFinishedPulling="2024-04-12 19:01:52.062312485 +0000 UTC m=+63.021887072" observedRunningTime="2024-04-12 19:01:52.789911955 +0000 UTC m=+63.749486504" watchObservedRunningTime="2024-04-12 19:02:17.563560389 +0000 UTC m=+88.523134939" Apr 12 19:02:17.637000 audit[4661]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.637000 audit[4661]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd75523fb0 a2=0 a3=7ffd75523f9c items=0 ppid=2233 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.641000 audit[4661]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.641000 audit[4661]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd75523fb0 a2=0 a3=7ffd75523f9c items=0 ppid=2233 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.655000 audit[4663]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.655000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff585d04e0 a2=0 a3=7fff585d04cc items=0 ppid=2233 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.655000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.659000 audit[4663]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.659000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff585d04e0 a2=0 a3=7fff585d04cc items=0 ppid=2233 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:21.002742 systemd[1]: Started sshd@14-10.128.0.14:22-139.178.89.65:56162.service. Apr 12 19:02:21.027553 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 19:02:21.027754 kernel: audit: type=1130 audit(1712948541.002:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.14:22-139.178.89.65:56162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:21.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.14:22-139.178.89.65:56162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:21.368000 audit[4672]: USER_ACCT pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.400874 kernel: audit: type=1101 audit(1712948541.368:1519): pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.401004 sshd[4672]: Accepted publickey for core from 139.178.89.65 port 56162 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:21.401280 sshd[4672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:21.398000 audit[4672]: CRED_ACQ pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.437992 kernel: audit: type=1103 audit(1712948541.398:1520): pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.437104 systemd-logind[1124]: New session 15 of user core. Apr 12 19:02:21.440264 systemd[1]: Started session-15.scope. Apr 12 19:02:21.475595 kernel: audit: type=1006 audit(1712948541.399:1521): pid=4672 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 19:02:21.475824 kernel: audit: type=1300 audit(1712948541.399:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe57783f00 a2=3 a3=0 items=0 ppid=1 pid=4672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.399000 audit[4672]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe57783f00 a2=3 a3=0 items=0 ppid=1 pid=4672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.399000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:21.510593 kernel: audit: type=1327 audit(1712948541.399:1521): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:21.510800 kernel: audit: type=1105 audit(1712948541.451:1522): pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.451000 audit[4672]: USER_START pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.453000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.567180 kernel: audit: type=1103 audit(1712948541.453:1523): pid=4674 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.793481 sshd[4672]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:21.794000 audit[4672]: USER_END pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.799466 systemd-logind[1124]: Session 15 logged out. Waiting for processes to exit. Apr 12 19:02:21.801179 systemd[1]: sshd@14-10.128.0.14:22-139.178.89.65:56162.service: Deactivated successfully. Apr 12 19:02:21.802432 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 19:02:21.804483 systemd-logind[1124]: Removed session 15. Apr 12 19:02:21.828553 kernel: audit: type=1106 audit(1712948541.794:1524): pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.828754 kernel: audit: type=1104 audit(1712948541.794:1525): pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.794000 audit[4672]: CRED_DISP pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:21.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.14:22-139.178.89.65:56162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:23.820670 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.Z5GYS6.mount: Deactivated successfully. Apr 12 19:02:26.851180 systemd[1]: Started sshd@15-10.128.0.14:22-139.178.89.65:56168.service. Apr 12 19:02:26.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.14:22-139.178.89.65:56168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:26.857809 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:02:26.883228 kernel: audit: type=1130 audit(1712948546.851:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.14:22-139.178.89.65:56168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:27.200000 audit[4704]: USER_ACCT pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.231583 kernel: audit: type=1101 audit(1712948547.200:1528): pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.231730 sshd[4704]: Accepted publickey for core from 139.178.89.65 port 56168 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:27.230000 audit[4704]: CRED_ACQ pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.232770 sshd[4704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:27.247475 systemd[1]: Started session-16.scope. Apr 12 19:02:27.248578 systemd-logind[1124]: New session 16 of user core. Apr 12 19:02:27.276240 kernel: audit: type=1103 audit(1712948547.230:1529): pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.276453 kernel: audit: type=1006 audit(1712948547.230:1530): pid=4704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 19:02:27.276715 kernel: audit: type=1300 audit(1712948547.230:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb70c6670 a2=3 a3=0 items=0 ppid=1 pid=4704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:27.230000 audit[4704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb70c6670 a2=3 a3=0 items=0 ppid=1 pid=4704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:27.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:27.305638 kernel: audit: type=1327 audit(1712948547.230:1530): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:27.259000 audit[4704]: USER_START pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.352166 kernel: audit: type=1105 audit(1712948547.259:1531): pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.263000 audit[4706]: CRED_ACQ pid=4706 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.376673 kernel: audit: type=1103 audit(1712948547.263:1532): pid=4706 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.557085 sshd[4704]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:27.559000 audit[4704]: USER_END pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.562558 systemd-logind[1124]: Session 16 logged out. Waiting for processes to exit. Apr 12 19:02:27.565295 systemd[1]: sshd@15-10.128.0.14:22-139.178.89.65:56168.service: Deactivated successfully. Apr 12 19:02:27.566757 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 19:02:27.569031 systemd-logind[1124]: Removed session 16. Apr 12 19:02:27.593800 kernel: audit: type=1106 audit(1712948547.559:1533): pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.593982 kernel: audit: type=1104 audit(1712948547.559:1534): pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.559000 audit[4704]: CRED_DISP pid=4704 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.14:22-139.178.89.65:56168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:27.620781 systemd[1]: Started sshd@16-10.128.0.14:22-139.178.89.65:43192.service. Apr 12 19:02:27.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.14:22-139.178.89.65:43192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:27.962000 audit[4716]: USER_ACCT pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.964441 sshd[4716]: Accepted publickey for core from 139.178.89.65 port 43192 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:27.964000 audit[4716]: CRED_ACQ pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.964000 audit[4716]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe98b7cb50 a2=3 a3=0 items=0 ppid=1 pid=4716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:27.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:27.965558 sshd[4716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:27.972185 systemd-logind[1124]: New session 17 of user core. Apr 12 19:02:27.973017 systemd[1]: Started session-17.scope. Apr 12 19:02:27.981000 audit[4716]: USER_START pid=4716 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:27.983000 audit[4720]: CRED_ACQ pid=4720 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.372854 sshd[4716]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:28.374000 audit[4716]: USER_END pid=4716 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.374000 audit[4716]: CRED_DISP pid=4716 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.377824 systemd[1]: sshd@16-10.128.0.14:22-139.178.89.65:43192.service: Deactivated successfully. Apr 12 19:02:28.379155 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 19:02:28.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.14:22-139.178.89.65:43192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:28.380123 systemd-logind[1124]: Session 17 logged out. Waiting for processes to exit. Apr 12 19:02:28.381504 systemd-logind[1124]: Removed session 17. Apr 12 19:02:28.428961 systemd[1]: Started sshd@17-10.128.0.14:22-139.178.89.65:43200.service. Apr 12 19:02:28.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.14:22-139.178.89.65:43200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:28.769000 audit[4730]: USER_ACCT pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.771054 sshd[4730]: Accepted publickey for core from 139.178.89.65 port 43200 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:28.770000 audit[4730]: CRED_ACQ pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.771000 audit[4730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2520c880 a2=3 a3=0 items=0 ppid=1 pid=4730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:28.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:28.773175 sshd[4730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:28.780122 systemd[1]: Started session-18.scope. Apr 12 19:02:28.780847 systemd-logind[1124]: New session 18 of user core. Apr 12 19:02:28.788000 audit[4730]: USER_START pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:28.790000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.045000 audit[4748]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.045000 audit[4748]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe87768c20 a2=0 a3=7ffe87768c0c items=0 ppid=2233 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.048000 audit[4748]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.048000 audit[4748]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe87768c20 a2=0 a3=0 items=0 ppid=2233 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.077000 audit[4750]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.077000 audit[4750]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff42400670 a2=0 a3=7fff4240065c items=0 ppid=2233 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.080000 audit[4750]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.080000 audit[4750]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff42400670 a2=0 a3=0 items=0 ppid=2233 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.096916 sshd[4730]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:31.097000 audit[4730]: USER_END pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.098000 audit[4730]: CRED_DISP pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.103394 systemd-logind[1124]: Session 18 logged out. Waiting for processes to exit. Apr 12 19:02:31.104117 systemd[1]: sshd@17-10.128.0.14:22-139.178.89.65:43200.service: Deactivated successfully. Apr 12 19:02:31.105481 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 19:02:31.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.14:22-139.178.89.65:43200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:31.107392 systemd-logind[1124]: Removed session 18. Apr 12 19:02:31.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.14:22-139.178.89.65:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:31.158604 systemd[1]: Started sshd@18-10.128.0.14:22-139.178.89.65:43206.service. Apr 12 19:02:31.493000 audit[4753]: USER_ACCT pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.495805 sshd[4753]: Accepted publickey for core from 139.178.89.65 port 43206 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:31.495000 audit[4753]: CRED_ACQ pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.495000 audit[4753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe13854970 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:31.498114 sshd[4753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:31.506106 systemd[1]: Started session-19.scope. Apr 12 19:02:31.506952 systemd-logind[1124]: New session 19 of user core. Apr 12 19:02:31.514000 audit[4753]: USER_START pid=4753 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.517000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.960610 sshd[4753]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:31.961000 audit[4753]: USER_END pid=4753 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.966473 systemd[1]: sshd@18-10.128.0.14:22-139.178.89.65:43206.service: Deactivated successfully. Apr 12 19:02:31.967936 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 19:02:31.969465 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 19:02:31.969596 kernel: audit: type=1106 audit(1712948551.961:1564): pid=4753 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.971265 systemd-logind[1124]: Session 19 logged out. Waiting for processes to exit. Apr 12 19:02:31.973087 systemd-logind[1124]: Removed session 19. Apr 12 19:02:31.961000 audit[4753]: CRED_DISP pid=4753 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.003536 kernel: audit: type=1104 audit(1712948551.961:1565): pid=4753 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:31.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.14:22-139.178.89.65:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:32.052686 kernel: audit: type=1131 audit(1712948551.965:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.14:22-139.178.89.65:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:32.045665 systemd[1]: Started sshd@19-10.128.0.14:22-139.178.89.65:43212.service. Apr 12 19:02:32.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.14:22-139.178.89.65:43212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:32.081674 kernel: audit: type=1130 audit(1712948552.044:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.14:22-139.178.89.65:43212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:32.388000 audit[4764]: USER_ACCT pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.392057 sshd[4764]: Accepted publickey for core from 139.178.89.65 port 43212 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:32.420675 kernel: audit: type=1101 audit(1712948552.388:1568): pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.419000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.421628 sshd[4764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:32.441664 systemd[1]: Started session-20.scope. Apr 12 19:02:32.444454 systemd-logind[1124]: New session 20 of user core. Apr 12 19:02:32.447534 kernel: audit: type=1103 audit(1712948552.419:1569): pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.447992 kernel: audit: type=1006 audit(1712948552.419:1570): pid=4764 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 19:02:32.419000 audit[4764]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaae59130 a2=3 a3=0 items=0 ppid=1 pid=4764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:32.492680 kernel: audit: type=1300 audit(1712948552.419:1570): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaae59130 a2=3 a3=0 items=0 ppid=1 pid=4764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:32.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:32.503141 kernel: audit: type=1327 audit(1712948552.419:1570): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:32.503301 kernel: audit: type=1105 audit(1712948552.453:1571): pid=4764 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.453000 audit[4764]: USER_START pid=4764 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.457000 audit[4766]: CRED_ACQ pid=4766 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.736364 sshd[4764]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:32.737000 audit[4764]: USER_END pid=4764 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.737000 audit[4764]: CRED_DISP pid=4764 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:32.741827 systemd[1]: sshd@19-10.128.0.14:22-139.178.89.65:43212.service: Deactivated successfully. Apr 12 19:02:32.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.14:22-139.178.89.65:43212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:32.743141 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 19:02:32.744233 systemd-logind[1124]: Session 20 logged out. Waiting for processes to exit. Apr 12 19:02:32.745623 systemd-logind[1124]: Removed session 20. Apr 12 19:02:37.770000 audit[4779]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.776895 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 19:02:37.777061 kernel: audit: type=1325 audit(1712948557.770:1576): table=filter:129 family=2 entries=20 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.770000 audit[4779]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff813b6ad0 a2=0 a3=7fff813b6abc items=0 ppid=2233 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.827535 kernel: audit: type=1300 audit(1712948557.770:1576): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff813b6ad0 a2=0 a3=7fff813b6abc items=0 ppid=2233 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.828379 systemd[1]: Started sshd@20-10.128.0.14:22-139.178.89.65:35448.service. Apr 12 19:02:37.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:37.775000 audit[4779]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.863354 kernel: audit: type=1327 audit(1712948557.770:1576): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:37.863476 kernel: audit: type=1325 audit(1712948557.775:1577): table=nat:130 family=2 entries=106 op=nft_register_chain pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.775000 audit[4779]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff813b6ad0 a2=0 a3=7fff813b6abc items=0 ppid=2233 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.906556 kernel: audit: type=1300 audit(1712948557.775:1577): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff813b6ad0 a2=0 a3=7fff813b6abc items=0 ppid=2233 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.906750 kernel: audit: type=1327 audit(1712948557.775:1577): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:37.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:37.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.14:22-139.178.89.65:35448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:37.937822 kernel: audit: type=1130 audit(1712948557.828:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.14:22-139.178.89.65:35448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:38.177000 audit[4782]: USER_ACCT pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.178854 sshd[4782]: Accepted publickey for core from 139.178.89.65 port 35448 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:38.208660 kernel: audit: type=1101 audit(1712948558.177:1579): pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.208000 audit[4782]: CRED_ACQ pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.210323 sshd[4782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:38.219140 systemd[1]: Started session-21.scope. Apr 12 19:02:38.220298 systemd-logind[1124]: New session 21 of user core. Apr 12 19:02:38.236947 kernel: audit: type=1103 audit(1712948558.208:1580): pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.209000 audit[4782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2af798e0 a2=3 a3=0 items=0 ppid=1 pid=4782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:38.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:38.233000 audit[4782]: USER_START pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.236000 audit[4784]: CRED_ACQ pid=4784 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.254592 kernel: audit: type=1006 audit(1712948558.209:1581): pid=4782 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 19:02:38.521240 sshd[4782]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:38.523000 audit[4782]: USER_END pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.523000 audit[4782]: CRED_DISP pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:38.525978 systemd[1]: sshd@20-10.128.0.14:22-139.178.89.65:35448.service: Deactivated successfully. Apr 12 19:02:38.527335 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 19:02:38.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.14:22-139.178.89.65:35448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:38.528557 systemd-logind[1124]: Session 21 logged out. Waiting for processes to exit. Apr 12 19:02:38.529885 systemd-logind[1124]: Removed session 21. Apr 12 19:02:43.581930 systemd[1]: Started sshd@21-10.128.0.14:22-139.178.89.65:35456.service. Apr 12 19:02:43.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.14:22-139.178.89.65:35456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:43.588237 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 19:02:43.590646 kernel: audit: type=1130 audit(1712948563.581:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.14:22-139.178.89.65:35456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:43.940000 audit[4824]: USER_ACCT pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:43.946664 sshd[4824]: Accepted publickey for core from 139.178.89.65 port 35456 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:43.948424 sshd[4824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:43.973907 kernel: audit: type=1101 audit(1712948563.940:1588): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:43.946000 audit[4824]: CRED_ACQ pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:43.983763 systemd[1]: Started session-22.scope. Apr 12 19:02:43.987630 systemd-logind[1124]: New session 22 of user core. Apr 12 19:02:44.006360 kernel: audit: type=1103 audit(1712948563.946:1589): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:43.946000 audit[4824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcec6d5260 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:44.053489 kernel: audit: type=1006 audit(1712948563.946:1590): pid=4824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 19:02:44.053677 kernel: audit: type=1300 audit(1712948563.946:1590): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcec6d5260 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:44.057550 kernel: audit: type=1327 audit(1712948563.946:1590): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:43.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:43.997000 audit[4824]: USER_START pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.095831 kernel: audit: type=1105 audit(1712948563.997:1591): pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.100249 kernel: audit: type=1103 audit(1712948564.003:1592): pid=4826 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.003000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.331972 sshd[4824]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:44.332000 audit[4824]: USER_END pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.337078 systemd[1]: sshd@21-10.128.0.14:22-139.178.89.65:35456.service: Deactivated successfully. Apr 12 19:02:44.338318 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 19:02:44.341259 systemd-logind[1124]: Session 22 logged out. Waiting for processes to exit. Apr 12 19:02:44.342962 systemd-logind[1124]: Removed session 22. Apr 12 19:02:44.371742 kernel: audit: type=1106 audit(1712948564.332:1593): pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.371921 kernel: audit: type=1104 audit(1712948564.332:1594): pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.332000 audit[4824]: CRED_DISP pid=4824 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:44.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.14:22-139.178.89.65:35456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:45.527000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.527000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021fde00 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:45.527000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:45.546000 audit[1956]: AVC avc: denied { watch } for pid=1956 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.546000 audit[1956]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002039ef0 a2=fc6 a3=0 items=0 ppid=1792 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c850 key=(null) Apr 12 19:02:45.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:02:45.791000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.791000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.791000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f9178f0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:45.791000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0109f2b40 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:45.792000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.792000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006dca6e0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.792000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:45.793000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.793000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006dca8c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:45.797000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.797000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f917da0 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:45.814000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:02:45.814000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00d3c9d70 a2=fc6 a3=0 items=0 ppid=1795 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:02:45.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:02:47.467573 systemd[1]: run-containerd-runc-k8s.io-a1f14773ddbdd4e81f8c2ba8d143b1e3ca5e9040e5afd8f3fd2fbf45b491f248-runc.GEz0NZ.mount: Deactivated successfully. Apr 12 19:02:47.507708 systemd[1]: run-containerd-runc-k8s.io-a1cecc26a80d40f9059a3063b0b8bdcc62b659a988b0dea85a3519f97898da13-runc.DAGwjR.mount: Deactivated successfully. Apr 12 19:02:49.418656 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 19:02:49.418825 kernel: audit: type=1130 audit(1712948569.387:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.14:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:49.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.14:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:49.387875 systemd[1]: Started sshd@22-10.128.0.14:22-139.178.89.65:59222.service. Apr 12 19:02:49.738000 audit[4877]: USER_ACCT pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.770536 kernel: audit: type=1101 audit(1712948569.738:1605): pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.770676 sshd[4877]: Accepted publickey for core from 139.178.89.65 port 59222 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:49.772289 sshd[4877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:49.771000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.780735 systemd[1]: Started session-23.scope. Apr 12 19:02:49.783001 systemd-logind[1124]: New session 23 of user core. Apr 12 19:02:49.800582 kernel: audit: type=1103 audit(1712948569.771:1606): pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.771000 audit[4877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd905d54b0 a2=3 a3=0 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:49.846899 kernel: audit: type=1006 audit(1712948569.771:1607): pid=4877 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 19:02:49.847129 kernel: audit: type=1300 audit(1712948569.771:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd905d54b0 a2=3 a3=0 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:49.847195 kernel: audit: type=1327 audit(1712948569.771:1607): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:49.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:49.856553 kernel: audit: type=1105 audit(1712948569.795:1608): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.795000 audit[4877]: USER_START pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.891521 kernel: audit: type=1103 audit(1712948569.803:1609): pid=4884 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:49.803000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:50.171785 sshd[4877]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:50.174000 audit[4877]: USER_END pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:50.181111 systemd[1]: sshd@22-10.128.0.14:22-139.178.89.65:59222.service: Deactivated successfully. Apr 12 19:02:50.182390 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 19:02:50.184526 systemd-logind[1124]: Session 23 logged out. Waiting for processes to exit. Apr 12 19:02:50.186032 systemd-logind[1124]: Removed session 23. Apr 12 19:02:50.174000 audit[4877]: CRED_DISP pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:50.233186 kernel: audit: type=1106 audit(1712948570.174:1610): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:50.233340 kernel: audit: type=1104 audit(1712948570.174:1611): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:50.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.14:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:53.688000 audit[4433]: AVC avc: denied { watch } for pid=4433 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.3189118676/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c342 tclass=file permissive=0 Apr 12 19:02:53.688000 audit[4433]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c67a80 a2=fc6 a3=0 items=0 ppid=4103 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c342 key=(null) Apr 12 19:02:53.688000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:02:53.820383 systemd[1]: run-containerd-runc-k8s.io-12cd60758bda702457a73a00924256e9a858916d996c09861f643c305d5420fb-runc.kPNwaJ.mount: Deactivated successfully. Apr 12 19:02:54.115000 audit[4396]: AVC avc: denied { watch } for pid=4396 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_01_47.4022320792/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c967 tclass=file permissive=0 Apr 12 19:02:54.115000 audit[4396]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dc6220 a2=fc6 a3=0 items=0 ppid=4061 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c967 key=(null) Apr 12 19:02:54.115000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:02:55.226821 systemd[1]: Started sshd@23-10.128.0.14:22-139.178.89.65:59228.service. Apr 12 19:02:55.246284 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 19:02:55.246405 kernel: audit: type=1130 audit(1712948575.225:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.14:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:55.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.14:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:55.577000 audit[4914]: USER_ACCT pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.609373 sshd[4914]: Accepted publickey for core from 139.178.89.65 port 59228 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:02:55.609946 kernel: audit: type=1101 audit(1712948575.577:1616): pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.610241 sshd[4914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:02:55.607000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.619709 systemd[1]: Started session-24.scope. Apr 12 19:02:55.621051 systemd-logind[1124]: New session 24 of user core. Apr 12 19:02:55.653258 kernel: audit: type=1103 audit(1712948575.607:1617): pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.653414 kernel: audit: type=1006 audit(1712948575.607:1618): pid=4914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 19:02:55.653465 kernel: audit: type=1300 audit(1712948575.607:1618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3be752f0 a2=3 a3=0 items=0 ppid=1 pid=4914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:55.607000 audit[4914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3be752f0 a2=3 a3=0 items=0 ppid=1 pid=4914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:55.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:55.682791 kernel: audit: type=1327 audit(1712948575.607:1618): proctitle=737368643A20636F7265205B707269765D Apr 12 19:02:55.635000 audit[4914]: USER_START pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.639000 audit[4916]: CRED_ACQ pid=4916 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.724673 kernel: audit: type=1105 audit(1712948575.635:1619): pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.724799 kernel: audit: type=1103 audit(1712948575.639:1620): pid=4916 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.933548 sshd[4914]: pam_unix(sshd:session): session closed for user core Apr 12 19:02:55.934000 audit[4914]: USER_END pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.940993 systemd[1]: sshd@23-10.128.0.14:22-139.178.89.65:59228.service: Deactivated successfully. Apr 12 19:02:55.942234 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 19:02:55.944196 systemd-logind[1124]: Session 24 logged out. Waiting for processes to exit. Apr 12 19:02:55.945734 systemd-logind[1124]: Removed session 24. Apr 12 19:02:55.936000 audit[4914]: CRED_DISP pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.992225 kernel: audit: type=1106 audit(1712948575.934:1621): pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.992411 kernel: audit: type=1104 audit(1712948575.936:1622): pid=4914 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:02:55.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.14:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'