Apr 12 19:06:01.015798 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 19:06:01.015819 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:06:01.015831 kernel: BIOS-provided physical RAM map: Apr 12 19:06:01.015838 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 19:06:01.015844 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 19:06:01.015851 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 19:06:01.015859 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Apr 12 19:06:01.015866 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Apr 12 19:06:01.015874 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 19:06:01.015881 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 19:06:01.015888 kernel: NX (Execute Disable) protection: active Apr 12 19:06:01.015894 kernel: SMBIOS 2.8 present. Apr 12 19:06:01.015901 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Apr 12 19:06:01.015908 kernel: Hypervisor detected: KVM Apr 12 19:06:01.015916 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 19:06:01.015925 kernel: kvm-clock: cpu 0, msr 2a191001, primary cpu clock Apr 12 19:06:01.015932 kernel: kvm-clock: using sched offset of 5967301630 cycles Apr 12 19:06:01.015940 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 19:06:01.015947 kernel: tsc: Detected 1996.249 MHz processor Apr 12 19:06:01.015955 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 19:06:01.015963 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 19:06:01.015970 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Apr 12 19:06:01.015978 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 19:06:01.015987 kernel: ACPI: Early table checksum verification disabled Apr 12 19:06:01.015995 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Apr 12 19:06:01.016002 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 19:06:01.016010 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 19:06:01.016017 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 19:06:01.016025 kernel: ACPI: FACS 0x000000007FFE0000 000040 Apr 12 19:06:01.016032 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 19:06:01.016040 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 19:06:01.016047 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Apr 12 19:06:01.016056 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Apr 12 19:06:01.016064 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Apr 12 19:06:01.016071 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Apr 12 19:06:01.016079 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Apr 12 19:06:01.016086 kernel: No NUMA configuration found Apr 12 19:06:01.016093 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Apr 12 19:06:01.016101 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Apr 12 19:06:01.016108 kernel: Zone ranges: Apr 12 19:06:01.016121 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 19:06:01.016129 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Apr 12 19:06:01.016136 kernel: Normal empty Apr 12 19:06:01.016144 kernel: Movable zone start for each node Apr 12 19:06:01.016151 kernel: Early memory node ranges Apr 12 19:06:01.016159 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 19:06:01.016168 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Apr 12 19:06:01.016176 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Apr 12 19:06:01.016184 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 19:06:01.016191 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 19:06:01.016199 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Apr 12 19:06:01.016206 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 19:06:01.016214 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 19:06:01.016222 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 19:06:01.016229 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 19:06:01.016239 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 19:06:01.016246 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 19:06:01.016254 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 19:06:01.016261 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 19:06:01.016269 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 19:06:01.016277 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 19:06:01.016285 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Apr 12 19:06:01.016292 kernel: Booting paravirtualized kernel on KVM Apr 12 19:06:01.016300 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 19:06:01.016308 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 19:06:01.016318 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 19:06:01.016325 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 19:06:01.016333 kernel: pcpu-alloc: [0] 0 1 Apr 12 19:06:01.016340 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Apr 12 19:06:01.016348 kernel: kvm-guest: PV spinlocks disabled, no host support Apr 12 19:06:01.016356 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Apr 12 19:06:01.016400 kernel: Policy zone: DMA32 Apr 12 19:06:01.016417 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:06:01.016429 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 19:06:01.016437 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:06:01.016445 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 19:06:01.016452 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 19:06:01.016460 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 123076K reserved, 0K cma-reserved) Apr 12 19:06:01.016468 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 19:06:01.016476 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 19:06:01.016483 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 19:06:01.016493 kernel: rcu: Hierarchical RCU implementation. Apr 12 19:06:01.016501 kernel: rcu: RCU event tracing is enabled. Apr 12 19:06:01.016509 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 19:06:01.016517 kernel: Rude variant of Tasks RCU enabled. Apr 12 19:06:01.016525 kernel: Tracing variant of Tasks RCU enabled. Apr 12 19:06:01.016533 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 19:06:01.016540 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 19:06:01.016548 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 19:06:01.016556 kernel: Console: colour VGA+ 80x25 Apr 12 19:06:01.016565 kernel: printk: console [tty0] enabled Apr 12 19:06:01.016572 kernel: printk: console [ttyS0] enabled Apr 12 19:06:01.016580 kernel: ACPI: Core revision 20210730 Apr 12 19:06:01.016588 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 19:06:01.016595 kernel: x2apic enabled Apr 12 19:06:01.016603 kernel: Switched APIC routing to physical x2apic. Apr 12 19:06:01.016611 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 19:06:01.016619 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 19:06:01.016627 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Apr 12 19:06:01.016634 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Apr 12 19:06:01.016644 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Apr 12 19:06:01.016651 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 19:06:01.016659 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 19:06:01.016667 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 19:06:01.016675 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 19:06:01.016682 kernel: Speculative Store Bypass: Vulnerable Apr 12 19:06:01.016690 kernel: x86/fpu: x87 FPU will use FXSAVE Apr 12 19:06:01.016697 kernel: Freeing SMP alternatives memory: 32K Apr 12 19:06:01.016705 kernel: pid_max: default: 32768 minimum: 301 Apr 12 19:06:01.016714 kernel: LSM: Security Framework initializing Apr 12 19:06:01.016722 kernel: SELinux: Initializing. Apr 12 19:06:01.016729 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 19:06:01.016737 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 19:06:01.016745 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Apr 12 19:06:01.016753 kernel: Performance Events: AMD PMU driver. Apr 12 19:06:01.016760 kernel: ... version: 0 Apr 12 19:06:01.016768 kernel: ... bit width: 48 Apr 12 19:06:01.016776 kernel: ... generic registers: 4 Apr 12 19:06:01.016790 kernel: ... value mask: 0000ffffffffffff Apr 12 19:06:01.016799 kernel: ... max period: 00007fffffffffff Apr 12 19:06:01.016808 kernel: ... fixed-purpose events: 0 Apr 12 19:06:01.016816 kernel: ... event mask: 000000000000000f Apr 12 19:06:01.016824 kernel: signal: max sigframe size: 1440 Apr 12 19:06:01.016832 kernel: rcu: Hierarchical SRCU implementation. Apr 12 19:06:01.016840 kernel: smp: Bringing up secondary CPUs ... Apr 12 19:06:01.016848 kernel: x86: Booting SMP configuration: Apr 12 19:06:01.016857 kernel: .... node #0, CPUs: #1 Apr 12 19:06:01.016865 kernel: kvm-clock: cpu 1, msr 2a191041, secondary cpu clock Apr 12 19:06:01.016874 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Apr 12 19:06:01.016882 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 19:06:01.016890 kernel: smpboot: Max logical packages: 2 Apr 12 19:06:01.016898 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Apr 12 19:06:01.016906 kernel: devtmpfs: initialized Apr 12 19:06:01.016914 kernel: x86/mm: Memory block size: 128MB Apr 12 19:06:01.016922 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 19:06:01.016932 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 19:06:01.016940 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 19:06:01.016948 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 19:06:01.016956 kernel: audit: initializing netlink subsys (disabled) Apr 12 19:06:01.016964 kernel: audit: type=2000 audit(1712948760.631:1): state=initialized audit_enabled=0 res=1 Apr 12 19:06:01.016972 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 19:06:01.016980 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 19:06:01.016987 kernel: cpuidle: using governor menu Apr 12 19:06:01.016995 kernel: ACPI: bus type PCI registered Apr 12 19:06:01.017005 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 19:06:01.017013 kernel: dca service started, version 1.12.1 Apr 12 19:06:01.017021 kernel: PCI: Using configuration type 1 for base access Apr 12 19:06:01.017029 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 19:06:01.017037 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 19:06:01.017045 kernel: ACPI: Added _OSI(Module Device) Apr 12 19:06:01.017053 kernel: ACPI: Added _OSI(Processor Device) Apr 12 19:06:01.017061 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 19:06:01.017069 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 19:06:01.017078 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 19:06:01.017087 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 19:06:01.017094 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 19:06:01.017103 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 19:06:01.017110 kernel: ACPI: Interpreter enabled Apr 12 19:06:01.017118 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 19:06:01.017126 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 19:06:01.017135 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 19:06:01.017143 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 19:06:01.017153 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 19:06:01.017281 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:06:01.017385 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 19:06:01.017399 kernel: acpiphp: Slot [3] registered Apr 12 19:06:01.017408 kernel: acpiphp: Slot [4] registered Apr 12 19:06:01.017416 kernel: acpiphp: Slot [5] registered Apr 12 19:06:01.017424 kernel: acpiphp: Slot [6] registered Apr 12 19:06:01.017435 kernel: acpiphp: Slot [7] registered Apr 12 19:06:01.017443 kernel: acpiphp: Slot [8] registered Apr 12 19:06:01.017451 kernel: acpiphp: Slot [9] registered Apr 12 19:06:01.017459 kernel: acpiphp: Slot [10] registered Apr 12 19:06:01.017467 kernel: acpiphp: Slot [11] registered Apr 12 19:06:01.017483 kernel: acpiphp: Slot [12] registered Apr 12 19:06:01.017491 kernel: acpiphp: Slot [13] registered Apr 12 19:06:01.017499 kernel: acpiphp: Slot [14] registered Apr 12 19:06:01.017507 kernel: acpiphp: Slot [15] registered Apr 12 19:06:01.017515 kernel: acpiphp: Slot [16] registered Apr 12 19:06:01.017525 kernel: acpiphp: Slot [17] registered Apr 12 19:06:01.017533 kernel: acpiphp: Slot [18] registered Apr 12 19:06:01.017541 kernel: acpiphp: Slot [19] registered Apr 12 19:06:01.017549 kernel: acpiphp: Slot [20] registered Apr 12 19:06:01.017557 kernel: acpiphp: Slot [21] registered Apr 12 19:06:01.017567 kernel: acpiphp: Slot [22] registered Apr 12 19:06:01.017575 kernel: acpiphp: Slot [23] registered Apr 12 19:06:01.017583 kernel: acpiphp: Slot [24] registered Apr 12 19:06:01.017592 kernel: acpiphp: Slot [25] registered Apr 12 19:06:01.017603 kernel: acpiphp: Slot [26] registered Apr 12 19:06:01.017611 kernel: acpiphp: Slot [27] registered Apr 12 19:06:01.017619 kernel: acpiphp: Slot [28] registered Apr 12 19:06:01.017628 kernel: acpiphp: Slot [29] registered Apr 12 19:06:01.017636 kernel: acpiphp: Slot [30] registered Apr 12 19:06:01.017645 kernel: acpiphp: Slot [31] registered Apr 12 19:06:01.017653 kernel: PCI host bridge to bus 0000:00 Apr 12 19:06:01.017751 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 19:06:01.017833 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 19:06:01.017917 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 19:06:01.017996 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Apr 12 19:06:01.018073 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 19:06:01.018151 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 19:06:01.018261 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 19:06:01.020154 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 19:06:01.020269 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 19:06:01.020355 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Apr 12 19:06:01.020490 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 19:06:01.020572 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 19:06:01.020653 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 19:06:01.020734 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 19:06:01.020824 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 19:06:01.020910 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 19:06:01.020992 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 19:06:01.021083 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Apr 12 19:06:01.021166 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Apr 12 19:06:01.021249 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Apr 12 19:06:01.021331 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Apr 12 19:06:01.022506 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Apr 12 19:06:01.022601 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 19:06:01.022701 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Apr 12 19:06:01.022789 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Apr 12 19:06:01.022871 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Apr 12 19:06:01.022952 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Apr 12 19:06:01.023033 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Apr 12 19:06:01.023126 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 19:06:01.023209 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 19:06:01.023289 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Apr 12 19:06:01.023420 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Apr 12 19:06:01.023521 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Apr 12 19:06:01.023603 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Apr 12 19:06:01.023685 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Apr 12 19:06:01.023777 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 19:06:01.023858 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Apr 12 19:06:01.023939 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Apr 12 19:06:01.023951 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 19:06:01.023960 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 19:06:01.023968 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 19:06:01.023976 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 19:06:01.023985 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 19:06:01.023996 kernel: iommu: Default domain type: Translated Apr 12 19:06:01.024004 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 19:06:01.024083 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 19:06:01.024165 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 19:06:01.024246 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 19:06:01.024258 kernel: vgaarb: loaded Apr 12 19:06:01.024266 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 19:06:01.024275 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 19:06:01.024283 kernel: PTP clock support registered Apr 12 19:06:01.024294 kernel: PCI: Using ACPI for IRQ routing Apr 12 19:06:01.024302 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 19:06:01.024310 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 19:06:01.024318 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Apr 12 19:06:01.024326 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 19:06:01.024334 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 19:06:01.024342 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 19:06:01.024350 kernel: pnp: PnP ACPI init Apr 12 19:06:01.024451 kernel: pnp 00:03: [dma 2] Apr 12 19:06:01.024468 kernel: pnp: PnP ACPI: found 5 devices Apr 12 19:06:01.024477 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 19:06:01.024485 kernel: NET: Registered PF_INET protocol family Apr 12 19:06:01.024493 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 19:06:01.024501 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 19:06:01.024510 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 19:06:01.024518 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 19:06:01.024526 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 19:06:01.024537 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 19:06:01.024545 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 19:06:01.024553 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 19:06:01.024562 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 19:06:01.024570 kernel: NET: Registered PF_XDP protocol family Apr 12 19:06:01.024643 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 19:06:01.024719 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 19:06:01.024792 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 19:06:01.024863 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Apr 12 19:06:01.024938 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 19:06:01.025021 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 19:06:01.025103 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 19:06:01.025184 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 19:06:01.025196 kernel: PCI: CLS 0 bytes, default 64 Apr 12 19:06:01.025205 kernel: Initialise system trusted keyrings Apr 12 19:06:01.025213 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 19:06:01.025224 kernel: Key type asymmetric registered Apr 12 19:06:01.025232 kernel: Asymmetric key parser 'x509' registered Apr 12 19:06:01.025240 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 19:06:01.025286 kernel: io scheduler mq-deadline registered Apr 12 19:06:01.025299 kernel: io scheduler kyber registered Apr 12 19:06:01.025307 kernel: io scheduler bfq registered Apr 12 19:06:01.025315 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 19:06:01.025324 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Apr 12 19:06:01.025332 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 19:06:01.025340 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Apr 12 19:06:01.025352 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 19:06:01.025372 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 19:06:01.025381 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 19:06:01.025389 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 19:06:01.025397 kernel: random: crng init done Apr 12 19:06:01.025405 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 19:06:01.025413 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 19:06:01.025421 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 19:06:01.025519 kernel: rtc_cmos 00:04: RTC can wake from S4 Apr 12 19:06:01.025618 kernel: rtc_cmos 00:04: registered as rtc0 Apr 12 19:06:01.025699 kernel: rtc_cmos 00:04: setting system clock to 2024-04-12T19:06:00 UTC (1712948760) Apr 12 19:06:01.025778 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Apr 12 19:06:01.025791 kernel: NET: Registered PF_INET6 protocol family Apr 12 19:06:01.025799 kernel: Segment Routing with IPv6 Apr 12 19:06:01.025808 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 19:06:01.025816 kernel: NET: Registered PF_PACKET protocol family Apr 12 19:06:01.025825 kernel: Key type dns_resolver registered Apr 12 19:06:01.025837 kernel: IPI shorthand broadcast: enabled Apr 12 19:06:01.025846 kernel: sched_clock: Marking stable (779336333, 129900165)->(944498206, -35261708) Apr 12 19:06:01.025854 kernel: registered taskstats version 1 Apr 12 19:06:01.025863 kernel: Loading compiled-in X.509 certificates Apr 12 19:06:01.025872 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 19:06:01.025881 kernel: Key type .fscrypt registered Apr 12 19:06:01.025890 kernel: Key type fscrypt-provisioning registered Apr 12 19:06:01.025899 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 19:06:01.025909 kernel: ima: Allocated hash algorithm: sha1 Apr 12 19:06:01.025918 kernel: ima: No architecture policies found Apr 12 19:06:01.025926 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 19:06:01.025935 kernel: Write protecting the kernel read-only data: 28672k Apr 12 19:06:01.025944 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 19:06:01.025952 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 19:06:01.025961 kernel: Run /init as init process Apr 12 19:06:01.025969 kernel: with arguments: Apr 12 19:06:01.025978 kernel: /init Apr 12 19:06:01.025988 kernel: with environment: Apr 12 19:06:01.025996 kernel: HOME=/ Apr 12 19:06:01.026005 kernel: TERM=linux Apr 12 19:06:01.026013 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 19:06:01.026025 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:06:01.026037 systemd[1]: Detected virtualization kvm. Apr 12 19:06:01.026047 systemd[1]: Detected architecture x86-64. Apr 12 19:06:01.026056 systemd[1]: Running in initrd. Apr 12 19:06:01.026067 systemd[1]: No hostname configured, using default hostname. Apr 12 19:06:01.026076 systemd[1]: Hostname set to . Apr 12 19:06:01.026086 systemd[1]: Initializing machine ID from VM UUID. Apr 12 19:06:01.026096 systemd[1]: Queued start job for default target initrd.target. Apr 12 19:06:01.026105 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:06:01.026114 systemd[1]: Reached target cryptsetup.target. Apr 12 19:06:01.026124 systemd[1]: Reached target paths.target. Apr 12 19:06:01.026133 systemd[1]: Reached target slices.target. Apr 12 19:06:01.026144 systemd[1]: Reached target swap.target. Apr 12 19:06:01.026154 systemd[1]: Reached target timers.target. Apr 12 19:06:01.026164 systemd[1]: Listening on iscsid.socket. Apr 12 19:06:01.026173 systemd[1]: Listening on iscsiuio.socket. Apr 12 19:06:01.026182 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 19:06:01.026191 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 19:06:01.026201 systemd[1]: Listening on systemd-journald.socket. Apr 12 19:06:01.026212 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:06:01.026221 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:06:01.026230 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:06:01.026240 systemd[1]: Reached target sockets.target. Apr 12 19:06:01.026249 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:06:01.026271 systemd[1]: Finished network-cleanup.service. Apr 12 19:06:01.026282 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 19:06:01.026293 systemd[1]: Starting systemd-journald.service... Apr 12 19:06:01.026303 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:06:01.026313 systemd[1]: Starting systemd-resolved.service... Apr 12 19:06:01.026322 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 19:06:01.026332 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:06:01.026344 systemd-journald[185]: Journal started Apr 12 19:06:01.026410 systemd-journald[185]: Runtime Journal (/run/log/journal/1bf4aaa6a21a4ee69b9d26c74ea6470b) is 4.9M, max 39.5M, 34.5M free. Apr 12 19:06:01.021413 systemd-modules-load[186]: Inserted module 'overlay' Apr 12 19:06:01.079576 systemd[1]: Started systemd-journald.service. Apr 12 19:06:01.079603 kernel: audit: type=1130 audit(1712948761.074:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.041544 systemd-resolved[187]: Positive Trust Anchors: Apr 12 19:06:01.041557 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:06:01.041593 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:06:01.044313 systemd-resolved[187]: Defaulting to hostname 'linux'. Apr 12 19:06:01.088300 kernel: audit: type=1130 audit(1712948761.083:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.084025 systemd[1]: Started systemd-resolved.service. Apr 12 19:06:01.095578 kernel: audit: type=1130 audit(1712948761.088:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.095596 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 19:06:01.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.089053 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 19:06:01.109099 kernel: audit: type=1130 audit(1712948761.095:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.109120 kernel: Bridge firewalling registered Apr 12 19:06:01.109131 kernel: audit: type=1130 audit(1712948761.100:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.096178 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 19:06:01.101205 systemd[1]: Reached target nss-lookup.target. Apr 12 19:06:01.106560 systemd-modules-load[186]: Inserted module 'br_netfilter' Apr 12 19:06:01.106640 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 19:06:01.107658 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:06:01.113684 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:06:01.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.122396 kernel: audit: type=1130 audit(1712948761.113:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.129742 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 19:06:01.131270 systemd[1]: Starting dracut-cmdline.service... Apr 12 19:06:01.136756 kernel: audit: type=1130 audit(1712948761.129:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.136786 kernel: SCSI subsystem initialized Apr 12 19:06:01.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.143127 dracut-cmdline[203]: dracut-dracut-053 Apr 12 19:06:01.145801 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:06:01.155431 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 19:06:01.155467 kernel: device-mapper: uevent: version 1.0.3 Apr 12 19:06:01.157666 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 19:06:01.161681 systemd-modules-load[186]: Inserted module 'dm_multipath' Apr 12 19:06:01.168612 kernel: audit: type=1130 audit(1712948761.162:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.162595 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:06:01.163949 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:06:01.177214 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:06:01.182685 kernel: audit: type=1130 audit(1712948761.177:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.225396 kernel: Loading iSCSI transport class v2.0-870. Apr 12 19:06:01.245388 kernel: iscsi: registered transport (tcp) Apr 12 19:06:01.275314 kernel: iscsi: registered transport (qla4xxx) Apr 12 19:06:01.275442 kernel: QLogic iSCSI HBA Driver Apr 12 19:06:01.326484 systemd[1]: Finished dracut-cmdline.service. Apr 12 19:06:01.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.329729 systemd[1]: Starting dracut-pre-udev.service... Apr 12 19:06:01.402484 kernel: raid6: sse2x4 gen() 11729 MB/s Apr 12 19:06:01.419467 kernel: raid6: sse2x4 xor() 4816 MB/s Apr 12 19:06:01.436482 kernel: raid6: sse2x2 gen() 14188 MB/s Apr 12 19:06:01.453515 kernel: raid6: sse2x2 xor() 8688 MB/s Apr 12 19:06:01.470463 kernel: raid6: sse2x1 gen() 10747 MB/s Apr 12 19:06:01.488244 kernel: raid6: sse2x1 xor() 5901 MB/s Apr 12 19:06:01.488412 kernel: raid6: using algorithm sse2x2 gen() 14188 MB/s Apr 12 19:06:01.488473 kernel: raid6: .... xor() 8688 MB/s, rmw enabled Apr 12 19:06:01.489032 kernel: raid6: using ssse3x2 recovery algorithm Apr 12 19:06:01.504414 kernel: xor: measuring software checksum speed Apr 12 19:06:01.506960 kernel: prefetch64-sse : 17183 MB/sec Apr 12 19:06:01.507026 kernel: generic_sse : 15696 MB/sec Apr 12 19:06:01.507054 kernel: xor: using function: prefetch64-sse (17183 MB/sec) Apr 12 19:06:01.626449 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 19:06:01.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.643586 systemd[1]: Finished dracut-pre-udev.service. Apr 12 19:06:01.645000 audit: BPF prog-id=7 op=LOAD Apr 12 19:06:01.645000 audit: BPF prog-id=8 op=LOAD Apr 12 19:06:01.647026 systemd[1]: Starting systemd-udevd.service... Apr 12 19:06:01.669530 systemd-udevd[385]: Using default interface naming scheme 'v252'. Apr 12 19:06:01.674300 systemd[1]: Started systemd-udevd.service. Apr 12 19:06:01.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.685223 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 19:06:01.701700 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Apr 12 19:06:01.761905 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 19:06:01.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.764921 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:06:01.836156 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:06:01.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:01.907442 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Apr 12 19:06:01.929865 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 19:06:01.929941 kernel: GPT:17805311 != 41943039 Apr 12 19:06:01.929969 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 19:06:01.931095 kernel: GPT:17805311 != 41943039 Apr 12 19:06:01.931940 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 19:06:01.933058 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 19:06:01.979412 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (445) Apr 12 19:06:01.992405 kernel: libata version 3.00 loaded. Apr 12 19:06:01.992893 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 19:06:02.039494 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 19:06:02.039872 kernel: scsi host0: ata_piix Apr 12 19:06:02.040170 kernel: scsi host1: ata_piix Apr 12 19:06:02.040481 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Apr 12 19:06:02.040521 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Apr 12 19:06:02.044329 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 19:06:02.048354 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 19:06:02.049088 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 19:06:02.055306 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:06:02.057195 systemd[1]: Starting disk-uuid.service... Apr 12 19:06:02.082444 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 19:06:02.087070 disk-uuid[461]: Primary Header is updated. Apr 12 19:06:02.087070 disk-uuid[461]: Secondary Entries is updated. Apr 12 19:06:02.087070 disk-uuid[461]: Secondary Header is updated. Apr 12 19:06:02.094435 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 19:06:03.106425 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 19:06:03.107580 disk-uuid[463]: The operation has completed successfully. Apr 12 19:06:03.168600 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 19:06:03.170609 systemd[1]: Finished disk-uuid.service. Apr 12 19:06:03.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.193801 systemd[1]: Starting verity-setup.service... Apr 12 19:06:03.237432 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Apr 12 19:06:03.338630 systemd[1]: Found device dev-mapper-usr.device. Apr 12 19:06:03.341690 systemd[1]: Mounting sysusr-usr.mount... Apr 12 19:06:03.350406 systemd[1]: Finished verity-setup.service. Apr 12 19:06:03.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.504427 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:06:03.505212 systemd[1]: Mounted sysusr-usr.mount. Apr 12 19:06:03.505828 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 19:06:03.506578 systemd[1]: Starting ignition-setup.service... Apr 12 19:06:03.512914 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 19:06:03.528290 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:06:03.528383 kernel: BTRFS info (device vda6): using free space tree Apr 12 19:06:03.528414 kernel: BTRFS info (device vda6): has skinny extents Apr 12 19:06:03.556480 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 19:06:03.572944 systemd[1]: Finished ignition-setup.service. Apr 12 19:06:03.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.576542 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 19:06:03.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.620000 audit: BPF prog-id=9 op=LOAD Apr 12 19:06:03.619438 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 19:06:03.623277 systemd[1]: Starting systemd-networkd.service... Apr 12 19:06:03.655047 systemd-networkd[633]: lo: Link UP Apr 12 19:06:03.656464 systemd-networkd[633]: lo: Gained carrier Apr 12 19:06:03.657561 systemd-networkd[633]: Enumeration completed Apr 12 19:06:03.658332 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:06:03.658379 systemd[1]: Started systemd-networkd.service. Apr 12 19:06:03.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.660134 systemd[1]: Reached target network.target. Apr 12 19:06:03.662557 systemd[1]: Starting iscsiuio.service... Apr 12 19:06:03.662992 systemd-networkd[633]: eth0: Link UP Apr 12 19:06:03.662996 systemd-networkd[633]: eth0: Gained carrier Apr 12 19:06:03.671784 systemd[1]: Started iscsiuio.service. Apr 12 19:06:03.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.673807 systemd[1]: Starting iscsid.service... Apr 12 19:06:03.677287 iscsid[638]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:06:03.677287 iscsid[638]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 19:06:03.677287 iscsid[638]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 19:06:03.677287 iscsid[638]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 19:06:03.677287 iscsid[638]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:06:03.677287 iscsid[638]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 19:06:03.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.679205 systemd[1]: Started iscsid.service. Apr 12 19:06:03.682046 systemd[1]: Starting dracut-initqueue.service... Apr 12 19:06:03.682718 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.96/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 19:06:03.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.699553 systemd[1]: Finished dracut-initqueue.service. Apr 12 19:06:03.700383 systemd[1]: Reached target remote-fs-pre.target. Apr 12 19:06:03.700977 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:06:03.703493 systemd[1]: Reached target remote-fs.target. Apr 12 19:06:03.706040 systemd[1]: Starting dracut-pre-mount.service... Apr 12 19:06:03.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:03.715931 systemd[1]: Finished dracut-pre-mount.service. Apr 12 19:06:04.568588 ignition[603]: Ignition 2.14.0 Apr 12 19:06:04.568618 ignition[603]: Stage: fetch-offline Apr 12 19:06:04.568793 ignition[603]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:04.568844 ignition[603]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:04.571286 ignition[603]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:04.571571 ignition[603]: parsed url from cmdline: "" Apr 12 19:06:04.571581 ignition[603]: no config URL provided Apr 12 19:06:04.571595 ignition[603]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:06:04.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:04.574300 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 19:06:04.571615 ignition[603]: no config at "/usr/lib/ignition/user.ign" Apr 12 19:06:04.577336 systemd[1]: Starting ignition-fetch.service... Apr 12 19:06:04.571627 ignition[603]: failed to fetch config: resource requires networking Apr 12 19:06:04.572316 ignition[603]: Ignition finished successfully Apr 12 19:06:04.595453 ignition[656]: Ignition 2.14.0 Apr 12 19:06:04.595487 ignition[656]: Stage: fetch Apr 12 19:06:04.595736 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:04.595780 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:04.599238 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:04.599493 ignition[656]: parsed url from cmdline: "" Apr 12 19:06:04.599503 ignition[656]: no config URL provided Apr 12 19:06:04.599516 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:06:04.599536 ignition[656]: no config at "/usr/lib/ignition/user.ign" Apr 12 19:06:04.609402 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Apr 12 19:06:04.609508 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Apr 12 19:06:04.610350 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Apr 12 19:06:05.050775 ignition[656]: GET result: OK Apr 12 19:06:05.050894 ignition[656]: parsing config with SHA512: 0d45a7ed954210d2ed6304d2121d7e5b7ddc6fae99adc2c6324757f8bafb5cfe9b70547783986bbc090a1fff329faca6783547bc225aa57c92fb8eb5003f2e5f Apr 12 19:06:05.183097 unknown[656]: fetched base config from "system" Apr 12 19:06:05.184483 unknown[656]: fetched base config from "system" Apr 12 19:06:05.185705 unknown[656]: fetched user config from "openstack" Apr 12 19:06:05.187862 ignition[656]: fetch: fetch complete Apr 12 19:06:05.187890 ignition[656]: fetch: fetch passed Apr 12 19:06:05.188032 ignition[656]: Ignition finished successfully Apr 12 19:06:05.190995 systemd[1]: Finished ignition-fetch.service. Apr 12 19:06:05.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.196615 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 19:06:05.196670 kernel: audit: type=1130 audit(1712948765.191:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.195671 systemd[1]: Starting ignition-kargs.service... Apr 12 19:06:05.224654 ignition[662]: Ignition 2.14.0 Apr 12 19:06:05.234456 ignition[662]: Stage: kargs Apr 12 19:06:05.234719 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:05.234769 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:05.237083 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:05.245220 ignition[662]: kargs: kargs passed Apr 12 19:06:05.245332 ignition[662]: Ignition finished successfully Apr 12 19:06:05.248015 systemd[1]: Finished ignition-kargs.service. Apr 12 19:06:05.257973 kernel: audit: type=1130 audit(1712948765.248:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.250930 systemd[1]: Starting ignition-disks.service... Apr 12 19:06:05.253949 systemd-networkd[633]: eth0: Gained IPv6LL Apr 12 19:06:05.265180 ignition[668]: Ignition 2.14.0 Apr 12 19:06:05.265193 ignition[668]: Stage: disks Apr 12 19:06:05.265310 ignition[668]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:05.265333 ignition[668]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:05.266560 ignition[668]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:05.268078 ignition[668]: disks: disks passed Apr 12 19:06:05.274927 kernel: audit: type=1130 audit(1712948765.269:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.269259 systemd[1]: Finished ignition-disks.service. Apr 12 19:06:05.268132 ignition[668]: Ignition finished successfully Apr 12 19:06:05.270215 systemd[1]: Reached target initrd-root-device.target. Apr 12 19:06:05.274522 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:06:05.275433 systemd[1]: Reached target local-fs.target. Apr 12 19:06:05.276286 systemd[1]: Reached target sysinit.target. Apr 12 19:06:05.277184 systemd[1]: Reached target basic.target. Apr 12 19:06:05.279231 systemd[1]: Starting systemd-fsck-root.service... Apr 12 19:06:05.299404 systemd-fsck[676]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 19:06:05.306951 systemd[1]: Finished systemd-fsck-root.service. Apr 12 19:06:05.311939 kernel: audit: type=1130 audit(1712948765.307:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.309423 systemd[1]: Mounting sysroot.mount... Apr 12 19:06:05.330433 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:06:05.330383 systemd[1]: Mounted sysroot.mount. Apr 12 19:06:05.330987 systemd[1]: Reached target initrd-root-fs.target. Apr 12 19:06:05.333722 systemd[1]: Mounting sysroot-usr.mount... Apr 12 19:06:05.334601 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 19:06:05.335319 systemd[1]: Starting flatcar-openstack-hostname.service... Apr 12 19:06:05.338593 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 19:06:05.338634 systemd[1]: Reached target ignition-diskful.target. Apr 12 19:06:05.348599 systemd[1]: Mounted sysroot-usr.mount. Apr 12 19:06:05.354520 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:06:05.356224 systemd[1]: Starting initrd-setup-root.service... Apr 12 19:06:05.369891 initrd-setup-root[688]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 19:06:05.384636 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (683) Apr 12 19:06:05.385936 initrd-setup-root[696]: cut: /sysroot/etc/group: No such file or directory Apr 12 19:06:05.391514 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:06:05.391548 kernel: BTRFS info (device vda6): using free space tree Apr 12 19:06:05.391561 kernel: BTRFS info (device vda6): has skinny extents Apr 12 19:06:05.397109 initrd-setup-root[716]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 19:06:05.405315 initrd-setup-root[730]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 19:06:05.411475 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:06:05.508850 systemd[1]: Finished initrd-setup-root.service. Apr 12 19:06:05.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.512394 systemd[1]: Starting ignition-mount.service... Apr 12 19:06:05.515626 kernel: audit: type=1130 audit(1712948765.510:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.519752 systemd[1]: Starting sysroot-boot.service... Apr 12 19:06:05.527163 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 19:06:05.528095 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 19:06:05.545814 ignition[751]: INFO : Ignition 2.14.0 Apr 12 19:06:05.546721 ignition[751]: INFO : Stage: mount Apr 12 19:06:05.547421 ignition[751]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:05.548254 ignition[751]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:05.551004 ignition[751]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:05.555415 ignition[751]: INFO : mount: mount passed Apr 12 19:06:05.556046 ignition[751]: INFO : Ignition finished successfully Apr 12 19:06:05.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.558317 systemd[1]: Finished ignition-mount.service. Apr 12 19:06:05.563154 coreos-metadata[682]: Apr 12 19:06:05.562 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Apr 12 19:06:05.564212 kernel: audit: type=1130 audit(1712948765.558:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.572751 systemd[1]: Finished sysroot-boot.service. Apr 12 19:06:05.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.577408 kernel: audit: type=1130 audit(1712948765.572:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.585584 coreos-metadata[682]: Apr 12 19:06:05.585 INFO Fetch successful Apr 12 19:06:05.586231 coreos-metadata[682]: Apr 12 19:06:05.585 INFO wrote hostname ci-3510-3-3-5-ba19de9024.novalocal to /sysroot/etc/hostname Apr 12 19:06:05.589590 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Apr 12 19:06:05.589717 systemd[1]: Finished flatcar-openstack-hostname.service. Apr 12 19:06:05.599191 kernel: audit: type=1130 audit(1712948765.589:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.599217 kernel: audit: type=1131 audit(1712948765.589:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:05.591334 systemd[1]: Starting ignition-files.service... Apr 12 19:06:05.602955 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:06:05.612425 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (760) Apr 12 19:06:05.615736 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:06:05.615773 kernel: BTRFS info (device vda6): using free space tree Apr 12 19:06:05.615794 kernel: BTRFS info (device vda6): has skinny extents Apr 12 19:06:05.625056 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:06:05.638005 ignition[779]: INFO : Ignition 2.14.0 Apr 12 19:06:05.638005 ignition[779]: INFO : Stage: files Apr 12 19:06:05.640060 ignition[779]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:05.640060 ignition[779]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:05.640060 ignition[779]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:05.646345 ignition[779]: DEBUG : files: compiled without relabeling support, skipping Apr 12 19:06:05.647866 ignition[779]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 19:06:05.647866 ignition[779]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 19:06:05.653740 ignition[779]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 19:06:05.654653 ignition[779]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 19:06:05.656620 unknown[779]: wrote ssh authorized keys file for user: core Apr 12 19:06:05.658664 ignition[779]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 19:06:05.658664 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:06:05.658664 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 19:06:06.068408 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 19:06:06.917351 ignition[779]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 19:06:06.934644 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:06:06.934644 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:06:06.939855 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 19:06:07.268192 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 19:06:07.750118 ignition[779]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 19:06:07.750118 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:06:07.750118 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 19:06:07.758274 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 19:06:07.771443 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 19:06:08.094083 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 19:06:08.095680 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:06:08.095680 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 19:06:08.238232 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 19:06:09.118810 ignition[779]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Apr 12 19:06:09.120417 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:06:09.121245 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:06:09.122239 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 19:06:09.231678 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 19:06:11.312764 ignition[779]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Apr 12 19:06:11.312764 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:06:11.315511 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 19:06:11.315511 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 19:06:11.421455 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 19:06:12.437181 ignition[779]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:06:12.440321 ignition[779]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:06:12.440321 ignition[779]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:06:12.440321 ignition[779]: INFO : files: op(f): op(10): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 19:06:12.440321 ignition[779]: INFO : files: op(f): op(10): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 19:06:12.492037 kernel: audit: type=1130 audit(1712948772.449:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.492098 kernel: audit: type=1130 audit(1712948772.472:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.492129 kernel: audit: type=1131 audit(1712948772.472:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.447409 systemd[1]: Finished ignition-files.service. Apr 12 19:06:12.503524 kernel: audit: type=1130 audit(1712948772.492:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(11): op(12): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(11): op(12): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(17): [started] processing unit "prepare-helm.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(17): op(18): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(17): op(18): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 19:06:12.503660 ignition[779]: INFO : files: op(17): [finished] processing unit "prepare-helm.service" Apr 12 19:06:12.451008 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:06:12.523109 ignition[779]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:06:12.523109 ignition[779]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:06:12.523109 ignition[779]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:06:12.523109 ignition[779]: INFO : files: files passed Apr 12 19:06:12.523109 ignition[779]: INFO : Ignition finished successfully Apr 12 19:06:12.462806 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 19:06:12.538715 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 19:06:12.464551 systemd[1]: Starting ignition-quench.service... Apr 12 19:06:12.471912 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 19:06:12.472028 systemd[1]: Finished ignition-quench.service. Apr 12 19:06:12.473053 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 19:06:12.493156 systemd[1]: Reached target ignition-complete.target. Apr 12 19:06:12.506324 systemd[1]: Starting initrd-parse-etc.service... Apr 12 19:06:12.545176 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 19:06:12.545499 systemd[1]: Finished initrd-parse-etc.service. Apr 12 19:06:12.554984 kernel: audit: type=1130 audit(1712948772.546:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.555010 kernel: audit: type=1131 audit(1712948772.546:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.547348 systemd[1]: Reached target initrd-fs.target. Apr 12 19:06:12.555502 systemd[1]: Reached target initrd.target. Apr 12 19:06:12.556466 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 19:06:12.557343 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 19:06:12.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.576485 kernel: audit: type=1130 audit(1712948772.572:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.572138 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 19:06:12.577839 systemd[1]: Starting initrd-cleanup.service... Apr 12 19:06:12.589522 systemd[1]: Stopped target nss-lookup.target. Apr 12 19:06:12.590703 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 19:06:12.591353 systemd[1]: Stopped target timers.target. Apr 12 19:06:12.592460 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 19:06:12.598711 kernel: audit: type=1131 audit(1712948772.593:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.592608 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 19:06:12.593594 systemd[1]: Stopped target initrd.target. Apr 12 19:06:12.599419 systemd[1]: Stopped target basic.target. Apr 12 19:06:12.600628 systemd[1]: Stopped target ignition-complete.target. Apr 12 19:06:12.601913 systemd[1]: Stopped target ignition-diskful.target. Apr 12 19:06:12.602996 systemd[1]: Stopped target initrd-root-device.target. Apr 12 19:06:12.604569 systemd[1]: Stopped target remote-fs.target. Apr 12 19:06:12.605989 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 19:06:12.607292 systemd[1]: Stopped target sysinit.target. Apr 12 19:06:12.608791 systemd[1]: Stopped target local-fs.target. Apr 12 19:06:12.610032 systemd[1]: Stopped target local-fs-pre.target. Apr 12 19:06:12.611445 systemd[1]: Stopped target swap.target. Apr 12 19:06:12.617895 kernel: audit: type=1131 audit(1712948772.613:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.612412 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 19:06:12.612623 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 19:06:12.624160 kernel: audit: type=1131 audit(1712948772.619:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.613674 systemd[1]: Stopped target cryptsetup.target. Apr 12 19:06:12.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.618515 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 19:06:12.618684 systemd[1]: Stopped dracut-initqueue.service. Apr 12 19:06:12.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.619983 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 19:06:12.620161 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 19:06:12.625181 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 19:06:12.625484 systemd[1]: Stopped ignition-files.service. Apr 12 19:06:12.627874 systemd[1]: Stopping ignition-mount.service... Apr 12 19:06:12.634977 iscsid[638]: iscsid shutting down. Apr 12 19:06:12.639609 systemd[1]: Stopping iscsid.service... Apr 12 19:06:12.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.640629 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 19:06:12.641011 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 19:06:12.644745 systemd[1]: Stopping sysroot-boot.service... Apr 12 19:06:12.646225 ignition[817]: INFO : Ignition 2.14.0 Apr 12 19:06:12.646963 ignition[817]: INFO : Stage: umount Apr 12 19:06:12.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.646356 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 19:06:12.649115 ignition[817]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:06:12.649115 ignition[817]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 19:06:12.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.646780 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 19:06:12.652421 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 19:06:12.648432 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 19:06:12.648790 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 19:06:12.655202 ignition[817]: INFO : umount: umount passed Apr 12 19:06:12.657836 ignition[817]: INFO : Ignition finished successfully Apr 12 19:06:12.659523 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:06:12.659752 systemd[1]: Stopped iscsid.service. Apr 12 19:06:12.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.662491 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 19:06:12.662700 systemd[1]: Stopped ignition-mount.service. Apr 12 19:06:12.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.664990 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 19:06:12.665083 systemd[1]: Finished initrd-cleanup.service. Apr 12 19:06:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.666995 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 19:06:12.667044 systemd[1]: Stopped ignition-disks.service. Apr 12 19:06:12.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.668015 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 19:06:12.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.668053 systemd[1]: Stopped ignition-kargs.service. Apr 12 19:06:12.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.669111 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 19:06:12.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.669149 systemd[1]: Stopped ignition-fetch.service. Apr 12 19:06:12.670073 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 19:06:12.670115 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 19:06:12.671968 systemd[1]: Stopped target paths.target. Apr 12 19:06:12.673261 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 19:06:12.676402 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 19:06:12.677443 systemd[1]: Stopped target slices.target. Apr 12 19:06:12.677948 systemd[1]: Stopped target sockets.target. Apr 12 19:06:12.678967 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 19:06:12.679022 systemd[1]: Closed iscsid.socket. Apr 12 19:06:12.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.679903 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 19:06:12.679958 systemd[1]: Stopped ignition-setup.service. Apr 12 19:06:12.684459 systemd[1]: Stopping iscsiuio.service... Apr 12 19:06:12.686803 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 19:06:12.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.686929 systemd[1]: Stopped iscsiuio.service. Apr 12 19:06:12.687836 systemd[1]: Stopped target network.target. Apr 12 19:06:12.688562 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 19:06:12.688605 systemd[1]: Closed iscsiuio.socket. Apr 12 19:06:12.689965 systemd[1]: Stopping systemd-networkd.service... Apr 12 19:06:12.691064 systemd[1]: Stopping systemd-resolved.service... Apr 12 19:06:12.694422 systemd-networkd[633]: eth0: DHCPv6 lease lost Apr 12 19:06:12.699173 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 19:06:12.699829 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 19:06:12.699967 systemd[1]: Stopped systemd-resolved.service. Apr 12 19:06:12.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.705380 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 19:06:12.705537 systemd[1]: Stopped systemd-networkd.service. Apr 12 19:06:12.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.707939 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 19:06:12.708031 systemd[1]: Stopped sysroot-boot.service. Apr 12 19:06:12.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.708000 audit: BPF prog-id=6 op=UNLOAD Apr 12 19:06:12.709185 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 19:06:12.709000 audit: BPF prog-id=9 op=UNLOAD Apr 12 19:06:12.709226 systemd[1]: Closed systemd-networkd.socket. Apr 12 19:06:12.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.710340 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 19:06:12.710449 systemd[1]: Stopped initrd-setup-root.service. Apr 12 19:06:12.712130 systemd[1]: Stopping network-cleanup.service... Apr 12 19:06:12.713937 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 19:06:12.714000 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 19:06:12.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.715172 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 19:06:12.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.715210 systemd[1]: Stopped systemd-sysctl.service. Apr 12 19:06:12.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.716278 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 19:06:12.716315 systemd[1]: Stopped systemd-modules-load.service. Apr 12 19:06:12.717177 systemd[1]: Stopping systemd-udevd.service... Apr 12 19:06:12.719084 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 19:06:12.721222 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 19:06:12.721325 systemd[1]: Stopped network-cleanup.service. Apr 12 19:06:12.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.723341 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 19:06:12.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.723483 systemd[1]: Stopped systemd-udevd.service. Apr 12 19:06:12.725195 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 19:06:12.725232 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 19:06:12.727427 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 19:06:12.727485 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 19:06:12.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.728222 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 19:06:12.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.728261 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 19:06:12.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.729223 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 19:06:12.729259 systemd[1]: Stopped dracut-cmdline.service. Apr 12 19:06:12.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.730102 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 19:06:12.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:12.730138 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 19:06:12.731670 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 19:06:12.732782 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 19:06:12.732829 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 19:06:12.737865 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 19:06:12.737943 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 19:06:12.738809 systemd[1]: Reached target initrd-switch-root.target. Apr 12 19:06:12.740269 systemd[1]: Starting initrd-switch-root.service... Apr 12 19:06:12.759782 systemd[1]: Switching root. Apr 12 19:06:12.778677 systemd-journald[185]: Journal stopped Apr 12 19:06:17.685595 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Apr 12 19:06:17.685649 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:06:17.685667 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:06:17.685682 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:06:17.685698 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:06:17.685710 kernel: SELinux: policy capability open_perms=1 Apr 12 19:06:17.685722 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:06:17.685733 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:06:17.685745 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:06:17.685762 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:06:17.686200 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:06:17.686215 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:06:17.686228 systemd[1]: Successfully loaded SELinux policy in 93.421ms. Apr 12 19:06:17.686255 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.948ms. Apr 12 19:06:17.686270 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:06:17.686283 systemd[1]: Detected virtualization kvm. Apr 12 19:06:17.686295 systemd[1]: Detected architecture x86-64. Apr 12 19:06:17.686313 systemd[1]: Detected first boot. Apr 12 19:06:17.686334 systemd[1]: Hostname set to . Apr 12 19:06:17.686350 systemd[1]: Initializing machine ID from VM UUID. Apr 12 19:06:17.686430 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:06:17.686446 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:06:17.686460 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:06:17.686478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:06:17.686499 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:06:17.686513 kernel: kauditd_printk_skb: 48 callbacks suppressed Apr 12 19:06:17.686524 kernel: audit: type=1334 audit(1712948777.457:90): prog-id=12 op=LOAD Apr 12 19:06:17.686536 kernel: audit: type=1334 audit(1712948777.457:91): prog-id=3 op=UNLOAD Apr 12 19:06:17.686547 kernel: audit: type=1334 audit(1712948777.457:92): prog-id=13 op=LOAD Apr 12 19:06:17.686558 kernel: audit: type=1334 audit(1712948777.457:93): prog-id=14 op=LOAD Apr 12 19:06:17.686569 kernel: audit: type=1334 audit(1712948777.457:94): prog-id=4 op=UNLOAD Apr 12 19:06:17.686581 kernel: audit: type=1334 audit(1712948777.457:95): prog-id=5 op=UNLOAD Apr 12 19:06:17.686592 kernel: audit: type=1334 audit(1712948777.462:96): prog-id=15 op=LOAD Apr 12 19:06:17.686605 kernel: audit: type=1334 audit(1712948777.462:97): prog-id=12 op=UNLOAD Apr 12 19:06:17.686617 kernel: audit: type=1334 audit(1712948777.464:98): prog-id=16 op=LOAD Apr 12 19:06:17.686628 kernel: audit: type=1334 audit(1712948777.464:99): prog-id=17 op=LOAD Apr 12 19:06:17.686640 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:06:17.686654 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:06:17.686666 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:06:17.686679 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:06:17.686694 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:06:17.686711 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:06:17.686723 systemd[1]: Created slice system-getty.slice. Apr 12 19:06:17.686736 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:06:17.686750 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:06:17.686774 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:06:17.686793 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:06:17.686806 systemd[1]: Created slice user.slice. Apr 12 19:06:17.686822 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:06:17.686835 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:06:17.686847 systemd[1]: Set up automount boot.automount. Apr 12 19:06:17.686859 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:06:17.686872 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:06:17.686884 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:06:17.686897 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:06:17.686909 systemd[1]: Reached target integritysetup.target. Apr 12 19:06:17.686921 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:06:17.686935 systemd[1]: Reached target remote-fs.target. Apr 12 19:06:17.686948 systemd[1]: Reached target slices.target. Apr 12 19:06:17.686960 systemd[1]: Reached target swap.target. Apr 12 19:06:17.686972 systemd[1]: Reached target torcx.target. Apr 12 19:06:17.686984 systemd[1]: Reached target veritysetup.target. Apr 12 19:06:17.686996 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:06:17.687009 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:06:17.687021 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:06:17.687033 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:06:17.687076 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:06:17.687096 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:06:17.687109 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:06:17.687121 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:06:17.687133 systemd[1]: Mounting media.mount... Apr 12 19:06:17.687146 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:06:17.687158 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:06:17.687170 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:06:17.687183 systemd[1]: Mounting tmp.mount... Apr 12 19:06:17.687195 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:06:17.687210 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:06:17.687222 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:06:17.687235 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:06:17.687247 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:06:17.687259 systemd[1]: Starting modprobe@drm.service... Apr 12 19:06:17.687271 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:06:17.687284 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:06:17.687296 systemd[1]: Starting modprobe@loop.service... Apr 12 19:06:17.687309 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:06:17.687323 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:06:17.687335 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:06:17.689201 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:06:17.689234 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:06:17.689249 systemd[1]: Stopped systemd-journald.service. Apr 12 19:06:17.689264 systemd[1]: Starting systemd-journald.service... Apr 12 19:06:17.689278 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:06:17.689291 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:06:17.689305 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:06:17.689323 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:06:17.689337 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:06:17.689351 systemd[1]: Stopped verity-setup.service. Apr 12 19:06:17.689419 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:06:17.689438 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:06:17.689451 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:06:17.689483 systemd[1]: Mounted media.mount. Apr 12 19:06:17.689506 kernel: fuse: init (API version 7.34) Apr 12 19:06:17.689519 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:06:17.689536 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:06:17.689548 systemd[1]: Mounted tmp.mount. Apr 12 19:06:17.689560 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:06:17.689572 kernel: loop: module loaded Apr 12 19:06:17.689584 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:06:17.689597 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:06:17.689609 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:06:17.689622 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:06:17.689634 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:06:17.689649 systemd[1]: Finished modprobe@drm.service. Apr 12 19:06:17.689664 systemd-journald[918]: Journal started Apr 12 19:06:17.689710 systemd-journald[918]: Runtime Journal (/run/log/journal/1bf4aaa6a21a4ee69b9d26c74ea6470b) is 4.9M, max 39.5M, 34.5M free. Apr 12 19:06:13.326000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:06:13.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:06:13.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:06:13.461000 audit: BPF prog-id=10 op=LOAD Apr 12 19:06:13.461000 audit: BPF prog-id=10 op=UNLOAD Apr 12 19:06:13.461000 audit: BPF prog-id=11 op=LOAD Apr 12 19:06:13.461000 audit: BPF prog-id=11 op=UNLOAD Apr 12 19:06:13.631000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:06:13.631000 audit[849]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:13.631000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:06:13.633000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:06:13.633000 audit[849]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:13.633000 audit: CWD cwd="/" Apr 12 19:06:13.633000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:13.633000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:13.633000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:06:17.457000 audit: BPF prog-id=12 op=LOAD Apr 12 19:06:17.457000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:06:17.457000 audit: BPF prog-id=13 op=LOAD Apr 12 19:06:17.457000 audit: BPF prog-id=14 op=LOAD Apr 12 19:06:17.457000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:06:17.457000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:06:17.462000 audit: BPF prog-id=15 op=LOAD Apr 12 19:06:17.462000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:06:17.464000 audit: BPF prog-id=16 op=LOAD Apr 12 19:06:17.464000 audit: BPF prog-id=17 op=LOAD Apr 12 19:06:17.464000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:06:17.464000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:06:17.467000 audit: BPF prog-id=18 op=LOAD Apr 12 19:06:17.467000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:06:17.468000 audit: BPF prog-id=19 op=LOAD Apr 12 19:06:17.471000 audit: BPF prog-id=20 op=LOAD Apr 12 19:06:17.471000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:06:17.471000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:06:17.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.478000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:06:17.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.623000 audit: BPF prog-id=21 op=LOAD Apr 12 19:06:17.623000 audit: BPF prog-id=22 op=LOAD Apr 12 19:06:17.623000 audit: BPF prog-id=23 op=LOAD Apr 12 19:06:17.623000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:06:17.623000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:06:17.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.682000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:06:17.682000 audit[918]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd2577e6e0 a2=4000 a3=7ffd2577e77c items=0 ppid=1 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:17.682000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 19:06:17.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:13.623047 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:06:17.455158 systemd[1]: Queued start job for default target multi-user.target. Apr 12 19:06:13.626579 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:06:17.455171 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 19:06:13.626602 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:06:17.472850 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 19:06:13.626636 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 19:06:17.693422 systemd[1]: Started systemd-journald.service. Apr 12 19:06:17.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:13.626648 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 19:06:13.626681 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 19:06:17.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:13.626697 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 19:06:13.626912 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 19:06:13.626953 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:06:17.694051 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:06:13.626968 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:06:17.694175 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:06:13.630465 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 19:06:13.630507 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 19:06:13.630546 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 19:06:13.630568 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 19:06:13.630590 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 19:06:13.630607 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:06:16.920441 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:06:17.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:16.920765 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:06:17.695887 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:06:16.920891 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:06:17.696009 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:06:16.921118 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:06:16.921180 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:06:16.921251 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T19:06:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:06:17.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.696739 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:06:17.696861 systemd[1]: Finished modprobe@loop.service. Apr 12 19:06:17.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.697634 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:06:17.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.699861 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:06:17.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.700650 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:06:17.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.701883 systemd[1]: Reached target network-pre.target. Apr 12 19:06:17.705148 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:06:17.711482 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:06:17.712075 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:06:17.717150 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:06:17.719347 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:06:17.719945 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:06:17.721213 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:06:17.721887 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:06:17.724601 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:06:17.727396 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:06:17.727980 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:06:17.734473 systemd-journald[918]: Time spent on flushing to /var/log/journal/1bf4aaa6a21a4ee69b9d26c74ea6470b is 35.173ms for 1157 entries. Apr 12 19:06:17.734473 systemd-journald[918]: System Journal (/var/log/journal/1bf4aaa6a21a4ee69b9d26c74ea6470b) is 8.0M, max 584.8M, 576.8M free. Apr 12 19:06:17.864228 systemd-journald[918]: Received client request to flush runtime journal. Apr 12 19:06:17.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:17.750138 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:06:17.751941 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:06:17.870634 udevadm[959]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:06:17.760533 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:06:17.761197 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:06:17.767631 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:06:17.818814 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:06:17.821272 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:06:17.866749 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:06:17.882406 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:06:17.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:18.680457 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:06:18.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:18.682000 audit: BPF prog-id=24 op=LOAD Apr 12 19:06:18.682000 audit: BPF prog-id=25 op=LOAD Apr 12 19:06:18.682000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:06:18.682000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:06:18.684687 systemd[1]: Starting systemd-udevd.service... Apr 12 19:06:18.725036 systemd-udevd[960]: Using default interface naming scheme 'v252'. Apr 12 19:06:18.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:18.994916 systemd[1]: Started systemd-udevd.service. Apr 12 19:06:19.002000 audit: BPF prog-id=26 op=LOAD Apr 12 19:06:19.004332 systemd[1]: Starting systemd-networkd.service... Apr 12 19:06:19.039000 audit: BPF prog-id=27 op=LOAD Apr 12 19:06:19.040000 audit: BPF prog-id=28 op=LOAD Apr 12 19:06:19.041000 audit: BPF prog-id=29 op=LOAD Apr 12 19:06:19.043464 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:06:19.090485 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 19:06:19.114155 systemd[1]: Started systemd-userdbd.service. Apr 12 19:06:19.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.145520 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:06:19.172417 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 19:06:19.178392 kernel: ACPI: button: Power Button [PWRF] Apr 12 19:06:19.187000 audit[981]: AVC avc: denied { confidentiality } for pid=981 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:06:19.187000 audit[981]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d8dfb3bcf0 a1=32194 a2=7f74dcf57bc5 a3=5 items=108 ppid=960 pid=981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:19.187000 audit: CWD cwd="/" Apr 12 19:06:19.187000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=1 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=2 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=3 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=4 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=5 name=(null) inode=14568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=6 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=7 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=8 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=9 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=10 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=11 name=(null) inode=14571 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=12 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=13 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=14 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=15 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=16 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=17 name=(null) inode=14574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=18 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=19 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=20 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=21 name=(null) inode=14576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=22 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=23 name=(null) inode=14577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=24 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=25 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=26 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=27 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=28 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=29 name=(null) inode=14580 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=30 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=31 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=32 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=33 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=34 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=35 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=36 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=37 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=38 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=39 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=40 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=41 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=42 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=43 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=44 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=45 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=46 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=47 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=48 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=49 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=50 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=51 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=52 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=53 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=55 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=56 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=57 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=58 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=59 name=(null) inode=14595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=60 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=61 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=62 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=63 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=64 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=65 name=(null) inode=14598 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=66 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=67 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.213380 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 19:06:19.187000 audit: PATH item=68 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=69 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=70 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=71 name=(null) inode=14601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=72 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=73 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=74 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=75 name=(null) inode=14603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=76 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=77 name=(null) inode=14604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=78 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=79 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=80 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=81 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=82 name=(null) inode=14602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=83 name=(null) inode=14607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=84 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=85 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=86 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=87 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=88 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=89 name=(null) inode=14610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=90 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=91 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=92 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=93 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=94 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=95 name=(null) inode=14613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=96 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=97 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=98 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=99 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=100 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=101 name=(null) inode=14616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=102 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=103 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=104 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=105 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=106 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PATH item=107 name=(null) inode=14619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:06:19.187000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:06:19.241500 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 19:06:19.250394 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 19:06:19.252284 systemd-networkd[970]: lo: Link UP Apr 12 19:06:19.252294 systemd-networkd[970]: lo: Gained carrier Apr 12 19:06:19.253058 systemd-networkd[970]: Enumeration completed Apr 12 19:06:19.253199 systemd[1]: Started systemd-networkd.service. Apr 12 19:06:19.254034 systemd-networkd[970]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:06:19.257970 systemd-networkd[970]: eth0: Link UP Apr 12 19:06:19.257979 systemd-networkd[970]: eth0: Gained carrier Apr 12 19:06:19.271499 systemd-networkd[970]: eth0: DHCPv4 address 172.24.4.96/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 19:06:19.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.294838 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:06:19.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.296785 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:06:19.339080 lvm[989]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:06:19.388778 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:06:19.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.390302 systemd[1]: Reached target cryptsetup.target. Apr 12 19:06:19.393848 systemd[1]: Starting lvm2-activation.service... Apr 12 19:06:19.403781 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:06:19.442709 systemd[1]: Finished lvm2-activation.service. Apr 12 19:06:19.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.444086 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:06:19.445701 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:06:19.445805 systemd[1]: Reached target local-fs.target. Apr 12 19:06:19.447419 systemd[1]: Reached target machines.target. Apr 12 19:06:19.451548 systemd[1]: Starting ldconfig.service... Apr 12 19:06:19.453797 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:06:19.453896 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:06:19.457121 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:06:19.462349 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:06:19.467989 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:06:19.470308 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:06:19.470450 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:06:19.474314 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:06:19.496355 systemd[1]: boot.automount: Got automount request for /boot, triggered by 992 (bootctl) Apr 12 19:06:19.499083 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:06:19.595239 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:06:19.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:19.823807 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:06:20.222972 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:06:20.273413 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:06:20.319935 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:06:20.321307 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:06:20.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.488883 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Apr 12 19:06:20.488883 systemd-fsck[1001]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 19:06:20.497517 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:06:20.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.502504 systemd[1]: Mounting boot.mount... Apr 12 19:06:20.533602 systemd[1]: Mounted boot.mount. Apr 12 19:06:20.580706 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:06:20.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.613865 systemd-networkd[970]: eth0: Gained IPv6LL Apr 12 19:06:20.754783 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:06:20.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.759157 systemd[1]: Starting audit-rules.service... Apr 12 19:06:20.762488 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:06:20.766067 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:06:20.770000 audit: BPF prog-id=30 op=LOAD Apr 12 19:06:20.776716 systemd[1]: Starting systemd-resolved.service... Apr 12 19:06:20.782000 audit: BPF prog-id=31 op=LOAD Apr 12 19:06:20.784749 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:06:20.790149 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:06:20.805000 audit[1011]: SYSTEM_BOOT pid=1011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.815757 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:06:20.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.840906 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:06:20.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.841534 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:06:20.897559 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:06:20.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:20.898168 systemd[1]: Reached target time-set.target. Apr 12 19:06:20.929588 systemd-resolved[1008]: Positive Trust Anchors: Apr 12 19:06:20.929629 systemd-resolved[1008]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:06:20.929708 systemd-resolved[1008]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:06:20.945346 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:06:20.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:21.783978 systemd-timesyncd[1009]: Contacted time server 5.39.80.51:123 (0.flatcar.pool.ntp.org). Apr 12 19:06:21.784197 systemd-timesyncd[1009]: Initial clock synchronization to Fri 2024-04-12 19:06:21.783641 UTC. Apr 12 19:06:21.784373 systemd-resolved[1008]: Using system hostname 'ci-3510-3-3-5-ba19de9024.novalocal'. Apr 12 19:06:21.785839 augenrules[1026]: No rules Apr 12 19:06:21.784000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:06:21.784000 audit[1026]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe18b21c40 a2=420 a3=0 items=0 ppid=1005 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:21.784000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:06:21.787813 systemd[1]: Started systemd-resolved.service. Apr 12 19:06:21.789885 systemd[1]: Finished audit-rules.service. Apr 12 19:06:21.791054 systemd[1]: Reached target network.target. Apr 12 19:06:21.792137 systemd[1]: Reached target nss-lookup.target. Apr 12 19:06:22.195395 ldconfig[991]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:06:22.217533 systemd[1]: Finished ldconfig.service. Apr 12 19:06:22.221583 systemd[1]: Starting systemd-update-done.service... Apr 12 19:06:22.237959 systemd[1]: Finished systemd-update-done.service. Apr 12 19:06:22.239456 systemd[1]: Reached target sysinit.target. Apr 12 19:06:22.240777 systemd[1]: Started motdgen.path. Apr 12 19:06:22.242030 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:06:22.253126 systemd[1]: Started logrotate.timer. Apr 12 19:06:22.254439 systemd[1]: Started mdadm.timer. Apr 12 19:06:22.255547 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:06:22.256740 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:06:22.256809 systemd[1]: Reached target paths.target. Apr 12 19:06:22.257892 systemd[1]: Reached target timers.target. Apr 12 19:06:22.260444 systemd[1]: Listening on dbus.socket. Apr 12 19:06:22.263964 systemd[1]: Starting docker.socket... Apr 12 19:06:22.271930 systemd[1]: Listening on sshd.socket. Apr 12 19:06:22.273309 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:06:22.274222 systemd[1]: Listening on docker.socket. Apr 12 19:06:22.275570 systemd[1]: Reached target sockets.target. Apr 12 19:06:22.276669 systemd[1]: Reached target basic.target. Apr 12 19:06:22.277817 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:06:22.277887 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:06:22.280054 systemd[1]: Starting containerd.service... Apr 12 19:06:22.283220 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:06:22.286736 systemd[1]: Starting dbus.service... Apr 12 19:06:22.291625 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:06:22.303943 systemd[1]: Starting extend-filesystems.service... Apr 12 19:06:22.305236 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:06:22.309282 systemd[1]: Starting motdgen.service... Apr 12 19:06:22.311919 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:06:22.317026 jq[1039]: false Apr 12 19:06:22.317125 systemd[1]: Starting prepare-critools.service... Apr 12 19:06:22.318973 systemd[1]: Starting prepare-helm.service... Apr 12 19:06:22.320457 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:06:22.321857 systemd[1]: Starting sshd-keygen.service... Apr 12 19:06:22.326752 systemd[1]: Starting systemd-logind.service... Apr 12 19:06:22.327315 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:06:22.327405 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 19:06:22.327898 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:06:22.331614 systemd[1]: Starting update-engine.service... Apr 12 19:06:22.333364 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:06:22.357710 jq[1049]: true Apr 12 19:06:22.362532 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:06:22.362695 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:06:22.370964 tar[1051]: ./ Apr 12 19:06:22.370964 tar[1051]: ./loopback Apr 12 19:06:22.373318 tar[1052]: crictl Apr 12 19:06:22.374673 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:06:22.374897 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:06:22.377850 tar[1053]: linux-amd64/helm Apr 12 19:06:22.394358 jq[1057]: true Apr 12 19:06:22.403699 dbus-daemon[1036]: [system] SELinux support is enabled Apr 12 19:06:22.404166 systemd[1]: Started dbus.service. Apr 12 19:06:22.406994 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:06:22.407026 systemd[1]: Reached target system-config.target. Apr 12 19:06:22.407609 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:06:22.407639 systemd[1]: Reached target user-config.target. Apr 12 19:06:22.419187 extend-filesystems[1040]: Found vda Apr 12 19:06:22.422593 extend-filesystems[1040]: Found vda1 Apr 12 19:06:22.423306 extend-filesystems[1040]: Found vda2 Apr 12 19:06:22.423868 extend-filesystems[1040]: Found vda3 Apr 12 19:06:22.424535 extend-filesystems[1040]: Found usr Apr 12 19:06:22.425137 extend-filesystems[1040]: Found vda4 Apr 12 19:06:22.425715 extend-filesystems[1040]: Found vda6 Apr 12 19:06:22.434132 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:06:22.434341 systemd[1]: Finished motdgen.service. Apr 12 19:06:22.440435 extend-filesystems[1040]: Found vda7 Apr 12 19:06:22.441088 extend-filesystems[1040]: Found vda9 Apr 12 19:06:22.442569 extend-filesystems[1040]: Checking size of /dev/vda9 Apr 12 19:06:22.494420 extend-filesystems[1040]: Resized partition /dev/vda9 Apr 12 19:06:22.515216 extend-filesystems[1094]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:06:22.556942 update_engine[1048]: I0412 19:06:22.552575 1048 main.cc:92] Flatcar Update Engine starting Apr 12 19:06:22.573274 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Apr 12 19:06:22.575150 systemd[1]: Started update-engine.service. Apr 12 19:06:22.575504 update_engine[1048]: I0412 19:06:22.575213 1048 update_check_scheduler.cc:74] Next update check in 2m52s Apr 12 19:06:22.577817 systemd[1]: Started locksmithd.service. Apr 12 19:06:22.579423 systemd-logind[1047]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 19:06:22.579458 systemd-logind[1047]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 19:06:22.579805 systemd-logind[1047]: New seat seat0. Apr 12 19:06:22.582455 systemd[1]: Started systemd-logind.service. Apr 12 19:06:22.603876 bash[1091]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:06:22.606298 tar[1051]: ./bandwidth Apr 12 19:06:22.607742 env[1054]: time="2024-04-12T19:06:22.607671956Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:06:22.642997 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:06:22.680614 coreos-metadata[1035]: Apr 12 19:06:22.680 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Apr 12 19:06:22.721093 env[1054]: time="2024-04-12T19:06:22.715735749Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:06:22.721267 env[1054]: time="2024-04-12T19:06:22.721229863Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729088663Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729162601Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729518218Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729540450Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729556690Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729590013Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730112 env[1054]: time="2024-04-12T19:06:22.729705059Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730472 env[1054]: time="2024-04-12T19:06:22.730386186Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730656 env[1054]: time="2024-04-12T19:06:22.730615797Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:06:22.730885 env[1054]: time="2024-04-12T19:06:22.730867198Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:06:22.731054 env[1054]: time="2024-04-12T19:06:22.731011008Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:06:22.731130 env[1054]: time="2024-04-12T19:06:22.731115163Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:06:22.762148 tar[1051]: ./ptp Apr 12 19:06:22.781920 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Apr 12 19:06:22.892670 coreos-metadata[1035]: Apr 12 19:06:22.892 INFO Fetch successful Apr 12 19:06:22.892670 coreos-metadata[1035]: Apr 12 19:06:22.892 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 19:06:23.396572 coreos-metadata[1035]: Apr 12 19:06:22.903 INFO Fetch successful Apr 12 19:06:23.396769 extend-filesystems[1094]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 19:06:23.396769 extend-filesystems[1094]: old_desc_blocks = 1, new_desc_blocks = 3 Apr 12 19:06:23.396769 extend-filesystems[1094]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Apr 12 19:06:23.402768 extend-filesystems[1040]: Resized filesystem in /dev/vda9 Apr 12 19:06:23.396889 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:06:23.397078 systemd[1]: Finished extend-filesystems.service. Apr 12 19:06:23.405415 env[1054]: time="2024-04-12T19:06:23.405288535Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:06:23.405522 env[1054]: time="2024-04-12T19:06:23.405445840Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:06:23.405635 env[1054]: time="2024-04-12T19:06:23.405536440Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:06:23.405890 env[1054]: time="2024-04-12T19:06:23.405739401Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.405936 env[1054]: time="2024-04-12T19:06:23.405845239Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.405965 env[1054]: time="2024-04-12T19:06:23.405928065Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406038 env[1054]: time="2024-04-12T19:06:23.406001502Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406127 env[1054]: time="2024-04-12T19:06:23.406054321Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406215 env[1054]: time="2024-04-12T19:06:23.406148508Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406324 env[1054]: time="2024-04-12T19:06:23.406230592Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406399 env[1054]: time="2024-04-12T19:06:23.406338494Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.406462 env[1054]: time="2024-04-12T19:06:23.406426029Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:06:23.406959 env[1054]: time="2024-04-12T19:06:23.406913854Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:06:23.407232 unknown[1035]: wrote ssh authorized keys file for user: core Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.407564895Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.408699142Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.408816392Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.408904667Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409114080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409194601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409310418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409352467Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409431014Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409507117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409548835Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409625078Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.412375 env[1054]: time="2024-04-12T19:06:23.409739583Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418400577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418530020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418570826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418610070Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418652289Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418733411Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:06:23.420432 env[1054]: time="2024-04-12T19:06:23.418782553Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:06:23.425531 env[1054]: time="2024-04-12T19:06:23.425471568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:06:23.438901 env[1054]: time="2024-04-12T19:06:23.426108533Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:06:23.438901 env[1054]: time="2024-04-12T19:06:23.426359223Z" level=info msg="Connect containerd service" Apr 12 19:06:23.438901 env[1054]: time="2024-04-12T19:06:23.426454772Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.452168128Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.452894380Z" level=info msg="Start subscribing containerd event" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.452989258Z" level=info msg="Start recovering state" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453079397Z" level=info msg="Start event monitor" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453066262Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453096198Z" level=info msg="Start snapshots syncer" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453199963Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453212306Z" level=info msg="Start streaming server" Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453330237Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:06:23.458144 env[1054]: time="2024-04-12T19:06:23.453529882Z" level=info msg="containerd successfully booted in 0.860074s" Apr 12 19:06:23.453596 systemd[1]: Started containerd.service. Apr 12 19:06:23.481260 update-ssh-keys[1105]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:06:23.482024 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:06:23.552007 tar[1051]: ./vlan Apr 12 19:06:23.655364 tar[1051]: ./host-device Apr 12 19:06:23.761707 tar[1051]: ./tuning Apr 12 19:06:23.839014 tar[1051]: ./vrf Apr 12 19:06:23.920296 tar[1051]: ./sbr Apr 12 19:06:23.993386 tar[1051]: ./tap Apr 12 19:06:24.079918 tar[1051]: ./dhcp Apr 12 19:06:24.157778 systemd[1]: Finished prepare-critools.service. Apr 12 19:06:24.280822 tar[1051]: ./static Apr 12 19:06:24.284502 tar[1053]: linux-amd64/LICENSE Apr 12 19:06:24.284502 tar[1053]: linux-amd64/README.md Apr 12 19:06:24.289272 systemd[1]: Finished prepare-helm.service. Apr 12 19:06:24.316176 tar[1051]: ./firewall Apr 12 19:06:24.368287 tar[1051]: ./macvlan Apr 12 19:06:24.409798 tar[1051]: ./dummy Apr 12 19:06:24.451609 tar[1051]: ./bridge Apr 12 19:06:24.497802 tar[1051]: ./ipvlan Apr 12 19:06:24.539779 tar[1051]: ./portmap Apr 12 19:06:24.578801 tar[1051]: ./host-local Apr 12 19:06:24.711722 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:06:24.861874 locksmithd[1098]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:06:25.164657 sshd_keygen[1071]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:06:25.191603 systemd[1]: Finished sshd-keygen.service. Apr 12 19:06:25.197465 systemd[1]: Starting issuegen.service... Apr 12 19:06:25.204470 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:06:25.204660 systemd[1]: Finished issuegen.service. Apr 12 19:06:25.207097 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:06:25.213380 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:06:25.215990 systemd[1]: Started getty@tty1.service. Apr 12 19:06:25.218410 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 19:06:25.219120 systemd[1]: Reached target getty.target. Apr 12 19:06:25.219767 systemd[1]: Reached target multi-user.target. Apr 12 19:06:25.221780 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:06:25.230126 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:06:25.230323 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:06:25.230945 systemd[1]: Startup finished in 1.027s (kernel) + 12.432s (initrd) + 11.204s (userspace) = 24.664s. Apr 12 19:06:31.678896 systemd[1]: Created slice system-sshd.slice. Apr 12 19:06:31.681542 systemd[1]: Started sshd@0-172.24.4.96:22-172.24.4.1:55482.service. Apr 12 19:06:33.151610 sshd[1127]: Accepted publickey for core from 172.24.4.1 port 55482 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:33.165853 sshd[1127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:33.218692 systemd-logind[1047]: New session 1 of user core. Apr 12 19:06:33.221887 systemd[1]: Created slice user-500.slice. Apr 12 19:06:33.224856 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:06:33.247419 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:06:33.250724 systemd[1]: Starting user@500.service... Apr 12 19:06:33.259831 (systemd)[1130]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:33.384404 systemd[1130]: Queued start job for default target default.target. Apr 12 19:06:33.385398 systemd[1130]: Reached target paths.target. Apr 12 19:06:33.385418 systemd[1130]: Reached target sockets.target. Apr 12 19:06:33.385433 systemd[1130]: Reached target timers.target. Apr 12 19:06:33.385447 systemd[1130]: Reached target basic.target. Apr 12 19:06:33.385492 systemd[1130]: Reached target default.target. Apr 12 19:06:33.385520 systemd[1130]: Startup finished in 112ms. Apr 12 19:06:33.385625 systemd[1]: Started user@500.service. Apr 12 19:06:33.386731 systemd[1]: Started session-1.scope. Apr 12 19:06:33.844944 systemd[1]: Started sshd@1-172.24.4.96:22-172.24.4.1:55488.service. Apr 12 19:06:35.350940 sshd[1139]: Accepted publickey for core from 172.24.4.1 port 55488 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:35.356120 sshd[1139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:35.371881 systemd-logind[1047]: New session 2 of user core. Apr 12 19:06:35.374855 systemd[1]: Started session-2.scope. Apr 12 19:06:36.302740 sshd[1139]: pam_unix(sshd:session): session closed for user core Apr 12 19:06:36.310951 systemd[1]: Started sshd@2-172.24.4.96:22-172.24.4.1:43436.service. Apr 12 19:06:36.312974 systemd[1]: sshd@1-172.24.4.96:22-172.24.4.1:55488.service: Deactivated successfully. Apr 12 19:06:36.315051 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 19:06:36.316981 systemd-logind[1047]: Session 2 logged out. Waiting for processes to exit. Apr 12 19:06:36.319749 systemd-logind[1047]: Removed session 2. Apr 12 19:06:37.877577 sshd[1144]: Accepted publickey for core from 172.24.4.1 port 43436 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:37.880610 sshd[1144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:37.891901 systemd-logind[1047]: New session 3 of user core. Apr 12 19:06:37.892764 systemd[1]: Started session-3.scope. Apr 12 19:06:38.601729 sshd[1144]: pam_unix(sshd:session): session closed for user core Apr 12 19:06:38.608287 systemd[1]: sshd@2-172.24.4.96:22-172.24.4.1:43436.service: Deactivated successfully. Apr 12 19:06:38.610862 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 19:06:38.613177 systemd-logind[1047]: Session 3 logged out. Waiting for processes to exit. Apr 12 19:06:38.616171 systemd[1]: Started sshd@3-172.24.4.96:22-172.24.4.1:43442.service. Apr 12 19:06:38.618687 systemd-logind[1047]: Removed session 3. Apr 12 19:06:40.126794 sshd[1151]: Accepted publickey for core from 172.24.4.1 port 43442 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:40.130816 sshd[1151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:40.140009 systemd-logind[1047]: New session 4 of user core. Apr 12 19:06:40.141406 systemd[1]: Started session-4.scope. Apr 12 19:06:40.994567 sshd[1151]: pam_unix(sshd:session): session closed for user core Apr 12 19:06:41.002517 systemd[1]: Started sshd@4-172.24.4.96:22-172.24.4.1:43458.service. Apr 12 19:06:41.008220 systemd[1]: sshd@3-172.24.4.96:22-172.24.4.1:43442.service: Deactivated successfully. Apr 12 19:06:41.010564 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:06:41.015110 systemd-logind[1047]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:06:41.019116 systemd-logind[1047]: Removed session 4. Apr 12 19:06:42.680049 sshd[1156]: Accepted publickey for core from 172.24.4.1 port 43458 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:42.684378 sshd[1156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:42.696808 systemd-logind[1047]: New session 5 of user core. Apr 12 19:06:42.698518 systemd[1]: Started session-5.scope. Apr 12 19:06:43.111310 sudo[1160]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:06:43.111831 sudo[1160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:06:43.123702 dbus-daemon[1036]: \xd0}L\xc51V: received setenforce notice (enforcing=-659880592) Apr 12 19:06:43.127895 sudo[1160]: pam_unix(sudo:session): session closed for user root Apr 12 19:06:43.288381 sshd[1156]: pam_unix(sshd:session): session closed for user core Apr 12 19:06:43.295441 systemd[1]: Started sshd@5-172.24.4.96:22-172.24.4.1:43464.service. Apr 12 19:06:43.296661 systemd[1]: sshd@4-172.24.4.96:22-172.24.4.1:43458.service: Deactivated successfully. Apr 12 19:06:43.299925 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:06:43.302860 systemd-logind[1047]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:06:43.305524 systemd-logind[1047]: Removed session 5. Apr 12 19:06:45.145795 sshd[1163]: Accepted publickey for core from 172.24.4.1 port 43464 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:45.148341 sshd[1163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:45.158019 systemd-logind[1047]: New session 6 of user core. Apr 12 19:06:45.158624 systemd[1]: Started session-6.scope. Apr 12 19:06:45.648164 sudo[1168]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:06:45.648695 sudo[1168]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:06:45.654706 sudo[1168]: pam_unix(sudo:session): session closed for user root Apr 12 19:06:45.663891 sudo[1167]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:06:45.664918 sudo[1167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:06:45.685711 systemd[1]: Stopping audit-rules.service... Apr 12 19:06:45.686000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:06:45.690035 kernel: kauditd_printk_skb: 190 callbacks suppressed Apr 12 19:06:45.690135 kernel: audit: type=1305 audit(1712948805.686:175): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:06:45.696314 kernel: audit: type=1300 audit(1712948805.686:175): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0d067310 a2=420 a3=0 items=0 ppid=1 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:45.686000 audit[1171]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0d067310 a2=420 a3=0 items=0 ppid=1 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:45.686000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:06:45.706573 auditctl[1171]: No rules Apr 12 19:06:45.709316 kernel: audit: type=1327 audit(1712948805.686:175): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:06:45.719140 kernel: audit: type=1131 audit(1712948805.709:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.709816 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:06:45.710184 systemd[1]: Stopped audit-rules.service. Apr 12 19:06:45.713709 systemd[1]: Starting audit-rules.service... Apr 12 19:06:45.754605 augenrules[1188]: No rules Apr 12 19:06:45.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.758547 sudo[1167]: pam_unix(sudo:session): session closed for user root Apr 12 19:06:45.756501 systemd[1]: Finished audit-rules.service. Apr 12 19:06:45.767288 kernel: audit: type=1130 audit(1712948805.755:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.757000 audit[1167]: USER_END pid=1167 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.757000 audit[1167]: CRED_DISP pid=1167 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.787780 kernel: audit: type=1106 audit(1712948805.757:178): pid=1167 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.787909 kernel: audit: type=1104 audit(1712948805.757:179): pid=1167 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.984446 sshd[1163]: pam_unix(sshd:session): session closed for user core Apr 12 19:06:45.985000 audit[1163]: USER_END pid=1163 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:45.997871 systemd[1]: Started sshd@6-172.24.4.96:22-172.24.4.1:47014.service. Apr 12 19:06:45.999300 systemd[1]: sshd@5-172.24.4.96:22-172.24.4.1:43464.service: Deactivated successfully. Apr 12 19:06:46.000965 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:06:46.006328 kernel: audit: type=1106 audit(1712948805.985:180): pid=1163 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:45.985000 audit[1163]: CRED_DISP pid=1163 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:46.019707 systemd-logind[1047]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:06:46.020310 kernel: audit: type=1104 audit(1712948805.985:181): pid=1163 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:45.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.96:22-172.24.4.1:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:46.031289 kernel: audit: type=1130 audit(1712948805.996:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.96:22-172.24.4.1:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:45.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.96:22-172.24.4.1:43464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:46.032119 systemd-logind[1047]: Removed session 6. Apr 12 19:06:47.428000 audit[1193]: USER_ACCT pid=1193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:47.430291 sshd[1193]: Accepted publickey for core from 172.24.4.1 port 47014 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:06:47.430000 audit[1193]: CRED_ACQ pid=1193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:47.431000 audit[1193]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb22eeca0 a2=3 a3=0 items=0 ppid=1 pid=1193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:47.431000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:06:47.433557 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:06:47.446831 systemd-logind[1047]: New session 7 of user core. Apr 12 19:06:47.447360 systemd[1]: Started session-7.scope. Apr 12 19:06:47.462000 audit[1193]: USER_START pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:47.465000 audit[1196]: CRED_ACQ pid=1196 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:06:47.983000 audit[1197]: USER_ACCT pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:47.985039 sudo[1197]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:06:47.984000 audit[1197]: CRED_REFR pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:47.986710 sudo[1197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:06:47.990000 audit[1197]: USER_START pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:06:48.891049 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:06:48.988306 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:06:48.989214 systemd[1]: Reached target network-online.target. Apr 12 19:06:48.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:48.992811 systemd[1]: Starting docker.service... Apr 12 19:06:49.095277 env[1213]: time="2024-04-12T19:06:49.095158650Z" level=info msg="Starting up" Apr 12 19:06:49.097229 env[1213]: time="2024-04-12T19:06:49.097197033Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:06:49.097229 env[1213]: time="2024-04-12T19:06:49.097220417Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:06:49.097481 env[1213]: time="2024-04-12T19:06:49.097272364Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:06:49.097481 env[1213]: time="2024-04-12T19:06:49.097289226Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:06:49.100173 env[1213]: time="2024-04-12T19:06:49.099694307Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:06:49.100173 env[1213]: time="2024-04-12T19:06:49.099717831Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:06:49.100173 env[1213]: time="2024-04-12T19:06:49.099738389Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:06:49.100173 env[1213]: time="2024-04-12T19:06:49.099749440Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:06:49.113682 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2269053426-merged.mount: Deactivated successfully. Apr 12 19:06:49.226349 env[1213]: time="2024-04-12T19:06:49.223932936Z" level=info msg="Loading containers: start." Apr 12 19:06:49.351000 audit[1245]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.351000 audit[1245]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd5d987190 a2=0 a3=7ffd5d98717c items=0 ppid=1213 pid=1245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 19:06:49.354000 audit[1247]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.354000 audit[1247]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffa11d85f0 a2=0 a3=7fffa11d85dc items=0 ppid=1213 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 19:06:49.356000 audit[1249]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.356000 audit[1249]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffdfcef620 a2=0 a3=7fffdfcef60c items=0 ppid=1213 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:06:49.358000 audit[1251]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.358000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffce17bcc40 a2=0 a3=7ffce17bcc2c items=0 ppid=1213 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:06:49.361000 audit[1253]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.361000 audit[1253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef4ca6220 a2=0 a3=7ffef4ca620c items=0 ppid=1213 pid=1253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 19:06:49.394000 audit[1258]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.394000 audit[1258]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf1130c50 a2=0 a3=7ffcf1130c3c items=0 ppid=1213 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 19:06:49.417000 audit[1260]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.417000 audit[1260]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdffd41560 a2=0 a3=7ffdffd4154c items=0 ppid=1213 pid=1260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 19:06:49.422000 audit[1262]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.422000 audit[1262]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe804cf730 a2=0 a3=7ffe804cf71c items=0 ppid=1213 pid=1262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.422000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 19:06:49.426000 audit[1264]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.426000 audit[1264]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffff49e44a0 a2=0 a3=7ffff49e448c items=0 ppid=1213 pid=1264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:06:49.444000 audit[1268]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.444000 audit[1268]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdab7bf5f0 a2=0 a3=7ffdab7bf5dc items=0 ppid=1213 pid=1268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:06:49.447000 audit[1269]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.447000 audit[1269]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe2a02bd80 a2=0 a3=7ffe2a02bd6c items=0 ppid=1213 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.447000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:06:49.476296 kernel: Initializing XFRM netlink socket Apr 12 19:06:49.535670 env[1213]: time="2024-04-12T19:06:49.535546377Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 19:06:49.559000 audit[1276]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.559000 audit[1276]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd3089c640 a2=0 a3=7ffd3089c62c items=0 ppid=1213 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 19:06:49.626000 audit[1280]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.626000 audit[1280]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffd9e46010 a2=0 a3=7fffd9e45ffc items=0 ppid=1213 pid=1280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.626000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 19:06:49.634000 audit[1283]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.634000 audit[1283]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc2f4bcc40 a2=0 a3=7ffc2f4bcc2c items=0 ppid=1213 pid=1283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 19:06:49.638000 audit[1285]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.638000 audit[1285]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef275c860 a2=0 a3=7ffef275c84c items=0 ppid=1213 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 19:06:49.643000 audit[1287]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.643000 audit[1287]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe3384cf40 a2=0 a3=7ffe3384cf2c items=0 ppid=1213 pid=1287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 19:06:49.648000 audit[1289]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.648000 audit[1289]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff8cfd1710 a2=0 a3=7fff8cfd16fc items=0 ppid=1213 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 19:06:49.653000 audit[1291]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.653000 audit[1291]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe1363cdc0 a2=0 a3=7ffe1363cdac items=0 ppid=1213 pid=1291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 19:06:49.771000 audit[1294]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.771000 audit[1294]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc0029c960 a2=0 a3=7ffc0029c94c items=0 ppid=1213 pid=1294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 19:06:49.777000 audit[1296]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.777000 audit[1296]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff0ebb7ec0 a2=0 a3=7fff0ebb7eac items=0 ppid=1213 pid=1296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:06:49.781000 audit[1298]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.781000 audit[1298]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff46a5ccb0 a2=0 a3=7fff46a5cc9c items=0 ppid=1213 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:06:49.786000 audit[1300]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.786000 audit[1300]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3f36be60 a2=0 a3=7ffe3f36be4c items=0 ppid=1213 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 19:06:49.789878 systemd-networkd[970]: docker0: Link UP Apr 12 19:06:49.878000 audit[1304]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.878000 audit[1304]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe837a42f0 a2=0 a3=7ffe837a42dc items=0 ppid=1213 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.878000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:06:49.880000 audit[1305]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:06:49.880000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc151ad1c0 a2=0 a3=7ffc151ad1ac items=0 ppid=1213 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:06:49.880000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:06:49.883228 env[1213]: time="2024-04-12T19:06:49.883175355Z" level=info msg="Loading containers: done." Apr 12 19:06:49.939268 env[1213]: time="2024-04-12T19:06:49.939152951Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 19:06:49.939633 env[1213]: time="2024-04-12T19:06:49.939595371Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 19:06:49.939893 env[1213]: time="2024-04-12T19:06:49.939851151Z" level=info msg="Daemon has completed initialization" Apr 12 19:06:49.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:49.986229 systemd[1]: Started docker.service. Apr 12 19:06:50.009751 env[1213]: time="2024-04-12T19:06:50.009645029Z" level=info msg="API listen on /run/docker.sock" Apr 12 19:06:50.052919 systemd[1]: Reloading. Apr 12 19:06:50.183683 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2024-04-12T19:06:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:06:50.183716 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2024-04-12T19:06:50Z" level=info msg="torcx already run" Apr 12 19:06:50.270473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:06:50.270493 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:06:50.294031 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit: BPF prog-id=37 op=LOAD Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.367000 audit: BPF prog-id=38 op=LOAD Apr 12 19:06:50.367000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:06:50.367000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit: BPF prog-id=39 op=LOAD Apr 12 19:06:50.368000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.368000 audit: BPF prog-id=40 op=LOAD Apr 12 19:06:50.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.369000 audit: BPF prog-id=41 op=LOAD Apr 12 19:06:50.369000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:06:50.369000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit: BPF prog-id=42 op=LOAD Apr 12 19:06:50.371000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit: BPF prog-id=43 op=LOAD Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.371000 audit: BPF prog-id=44 op=LOAD Apr 12 19:06:50.372000 audit: BPF prog-id=33 op=UNLOAD Apr 12 19:06:50.372000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.373000 audit: BPF prog-id=45 op=LOAD Apr 12 19:06:50.373000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit: BPF prog-id=46 op=LOAD Apr 12 19:06:50.374000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit: BPF prog-id=47 op=LOAD Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.374000 audit: BPF prog-id=48 op=LOAD Apr 12 19:06:50.374000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:06:50.374000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.375000 audit: BPF prog-id=49 op=LOAD Apr 12 19:06:50.375000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit: BPF prog-id=50 op=LOAD Apr 12 19:06:50.376000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:06:50.376000 audit: BPF prog-id=51 op=LOAD Apr 12 19:06:50.376000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:06:50.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:06:50.392925 systemd[1]: Started kubelet.service. Apr 12 19:06:50.545238 kubelet[1398]: E0412 19:06:50.545147 1398 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 19:06:50.552081 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:06:50.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:06:50.552198 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:06:51.533454 env[1054]: time="2024-04-12T19:06:51.533313900Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 19:06:52.385608 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3242567130.mount: Deactivated successfully. Apr 12 19:06:55.136871 env[1054]: time="2024-04-12T19:06:55.136705562Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:55.141860 env[1054]: time="2024-04-12T19:06:55.141774170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:55.146554 env[1054]: time="2024-04-12T19:06:55.146502134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:55.153075 env[1054]: time="2024-04-12T19:06:55.152996676Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:55.153850 env[1054]: time="2024-04-12T19:06:55.153729461Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809\"" Apr 12 19:06:55.168166 env[1054]: time="2024-04-12T19:06:55.168068737Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 19:06:58.088620 env[1054]: time="2024-04-12T19:06:58.088532848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:58.092347 env[1054]: time="2024-04-12T19:06:58.092258981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:58.095644 env[1054]: time="2024-04-12T19:06:58.095592051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:58.099142 env[1054]: time="2024-04-12T19:06:58.099111843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:06:58.101258 env[1054]: time="2024-04-12T19:06:58.101180667Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7\"" Apr 12 19:06:58.122481 env[1054]: time="2024-04-12T19:06:58.122445706Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 19:07:00.474799 env[1054]: time="2024-04-12T19:07:00.474645753Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:00.479138 env[1054]: time="2024-04-12T19:07:00.479062732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:00.526950 env[1054]: time="2024-04-12T19:07:00.526800101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:00.534271 env[1054]: time="2024-04-12T19:07:00.534162324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:00.538520 env[1054]: time="2024-04-12T19:07:00.538409483Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833\"" Apr 12 19:07:00.566395 env[1054]: time="2024-04-12T19:07:00.566231307Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 19:07:00.588458 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 19:07:00.601943 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 19:07:00.602035 kernel: audit: type=1130 audit(1712948820.587:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.588900 systemd[1]: Stopped kubelet.service. Apr 12 19:07:00.592205 systemd[1]: Started kubelet.service. Apr 12 19:07:00.618061 kernel: audit: type=1131 audit(1712948820.587:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.618345 kernel: audit: type=1130 audit(1712948820.591:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:00.691187 kubelet[1431]: E0412 19:07:00.691141 1431 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 19:07:00.697590 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:07:00.697914 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:07:00.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:07:00.702313 kernel: audit: type=1131 audit(1712948820.697:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:07:02.843532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount558198246.mount: Deactivated successfully. Apr 12 19:07:03.619278 env[1054]: time="2024-04-12T19:07:03.619130670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:03.630408 env[1054]: time="2024-04-12T19:07:03.630363462Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:03.632762 env[1054]: time="2024-04-12T19:07:03.632693451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:03.634738 env[1054]: time="2024-04-12T19:07:03.634676086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:03.635420 env[1054]: time="2024-04-12T19:07:03.635375494Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 19:07:03.653139 env[1054]: time="2024-04-12T19:07:03.653079346Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 19:07:04.339118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount229393166.mount: Deactivated successfully. Apr 12 19:07:04.355563 env[1054]: time="2024-04-12T19:07:04.355449455Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:04.358666 env[1054]: time="2024-04-12T19:07:04.358614035Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:04.362083 env[1054]: time="2024-04-12T19:07:04.361992447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:04.365398 env[1054]: time="2024-04-12T19:07:04.365338560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:04.366835 env[1054]: time="2024-04-12T19:07:04.366752473Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 19:07:04.392521 env[1054]: time="2024-04-12T19:07:04.392419694Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 19:07:05.362622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount342320976.mount: Deactivated successfully. Apr 12 19:07:07.585449 update_engine[1048]: I0412 19:07:07.585362 1048 update_attempter.cc:509] Updating boot flags... Apr 12 19:07:10.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.842454 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 19:07:10.852483 kernel: audit: type=1130 audit(1712948830.842:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.852578 kernel: audit: type=1131 audit(1712948830.842:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.852633 kernel: audit: type=1130 audit(1712948830.847:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:10.843798 systemd[1]: Stopped kubelet.service. Apr 12 19:07:10.849210 systemd[1]: Started kubelet.service. Apr 12 19:07:10.948053 kubelet[1461]: E0412 19:07:10.947987 1461 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 19:07:10.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:07:10.949925 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:07:10.950052 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:07:10.955737 kernel: audit: type=1131 audit(1712948830.949:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:07:12.856714 env[1054]: time="2024-04-12T19:07:12.856475315Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:12.861513 env[1054]: time="2024-04-12T19:07:12.861443446Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:12.864792 env[1054]: time="2024-04-12T19:07:12.864715017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:12.870375 env[1054]: time="2024-04-12T19:07:12.870311630Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:12.871504 env[1054]: time="2024-04-12T19:07:12.871379608Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Apr 12 19:07:12.899022 env[1054]: time="2024-04-12T19:07:12.898954965Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 19:07:13.558189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4055114486.mount: Deactivated successfully. Apr 12 19:07:14.773852 env[1054]: time="2024-04-12T19:07:14.772402797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:14.779426 env[1054]: time="2024-04-12T19:07:14.775430889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:14.779426 env[1054]: time="2024-04-12T19:07:14.777446678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:14.779719 env[1054]: time="2024-04-12T19:07:14.779636954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:14.779989 env[1054]: time="2024-04-12T19:07:14.779914446Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 19:07:18.928564 systemd[1]: Stopped kubelet.service. Apr 12 19:07:18.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:18.938287 kernel: audit: type=1130 audit(1712948838.928:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:18.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:18.942290 kernel: audit: type=1131 audit(1712948838.934:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:19.002201 systemd[1]: Reloading. Apr 12 19:07:19.125642 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2024-04-12T19:07:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:07:19.130419 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2024-04-12T19:07:19Z" level=info msg="torcx already run" Apr 12 19:07:19.223841 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:07:19.223875 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:07:19.251276 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:07:19.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.341135 kernel: audit: type=1400 audit(1712948839.333:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.341349 kernel: audit: type=1400 audit(1712948839.337:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.346696 kernel: audit: type=1400 audit(1712948839.337:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368586 kernel: audit: type=1400 audit(1712948839.337:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368726 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:07:19.368779 kernel: audit: type=1400 audit(1712948839.337:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368825 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:07:19.368871 kernel: audit: backlog limit exceeded Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit: BPF prog-id=52 op=LOAD Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.340000 audit: BPF prog-id=53 op=LOAD Apr 12 19:07:19.340000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:07:19.340000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit: BPF prog-id=54 op=LOAD Apr 12 19:07:19.344000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.344000 audit: BPF prog-id=55 op=LOAD Apr 12 19:07:19.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.345000 audit: BPF prog-id=56 op=LOAD Apr 12 19:07:19.345000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:07:19.345000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:07:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.353000 audit: BPF prog-id=57 op=LOAD Apr 12 19:07:19.353000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:07:19.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit: BPF prog-id=60 op=LOAD Apr 12 19:07:19.369000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.370000 audit: BPF prog-id=61 op=LOAD Apr 12 19:07:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit: BPF prog-id=64 op=LOAD Apr 12 19:07:19.372000 audit: BPF prog-id=49 op=UNLOAD Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit: BPF prog-id=65 op=LOAD Apr 12 19:07:19.373000 audit: BPF prog-id=50 op=UNLOAD Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.373000 audit: BPF prog-id=66 op=LOAD Apr 12 19:07:19.374000 audit: BPF prog-id=51 op=UNLOAD Apr 12 19:07:19.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:19.395316 systemd[1]: Started kubelet.service. Apr 12 19:07:19.469502 kubelet[1604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:07:19.469893 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:07:19.469948 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:07:19.470076 kubelet[1604]: I0412 19:07:19.470043 1604 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:07:19.819610 kubelet[1604]: I0412 19:07:19.819553 1604 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 19:07:19.819988 kubelet[1604]: I0412 19:07:19.819962 1604 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:07:19.821516 kubelet[1604]: I0412 19:07:19.821479 1604 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 19:07:19.830924 kubelet[1604]: I0412 19:07:19.830874 1604 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:07:19.831170 kubelet[1604]: I0412 19:07:19.831067 1604 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:07:19.831170 kubelet[1604]: I0412 19:07:19.831143 1604 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 19:07:19.831170 kubelet[1604]: I0412 19:07:19.831161 1604 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 19:07:19.831170 kubelet[1604]: I0412 19:07:19.831173 1604 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 19:07:19.831620 kubelet[1604]: I0412 19:07:19.831272 1604 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:07:19.831736 kubelet[1604]: E0412 19:07:19.830882 1604 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.96:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.831941 kubelet[1604]: I0412 19:07:19.831913 1604 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:07:19.841822 kubelet[1604]: I0412 19:07:19.841768 1604 kubelet.go:405] "Attempting to sync node with API server" Apr 12 19:07:19.841822 kubelet[1604]: I0412 19:07:19.841796 1604 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:07:19.841822 kubelet[1604]: I0412 19:07:19.841816 1604 kubelet.go:309] "Adding apiserver pod source" Apr 12 19:07:19.841822 kubelet[1604]: I0412 19:07:19.841830 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:07:19.843783 kubelet[1604]: W0412 19:07:19.843687 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.844401 kubelet[1604]: E0412 19:07:19.844373 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.844784 kubelet[1604]: I0412 19:07:19.844731 1604 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:07:19.846228 kubelet[1604]: W0412 19:07:19.846197 1604 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:07:19.847040 kubelet[1604]: W0412 19:07:19.846981 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.96:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.847040 kubelet[1604]: E0412 19:07:19.847028 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.96:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.847927 kubelet[1604]: I0412 19:07:19.847896 1604 server.go:1168] "Started kubelet" Apr 12 19:07:19.849179 kubelet[1604]: I0412 19:07:19.848404 1604 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 19:07:19.849179 kubelet[1604]: I0412 19:07:19.849128 1604 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:07:19.849816 kubelet[1604]: I0412 19:07:19.849775 1604 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:07:19.851016 kubelet[1604]: E0412 19:07:19.850824 1604 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-3-5-ba19de9024.novalocal.17c59de4ed8c2e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-3-5-ba19de9024.novalocal", UID:"ci-3510-3-3-5-ba19de9024.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-3-5-ba19de9024.novalocal"}, FirstTimestamp:time.Date(2024, time.April, 12, 19, 7, 19, 847833131, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 19, 7, 19, 847833131, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.24.4.96:6443/api/v1/namespaces/default/events": dial tcp 172.24.4.96:6443: connect: connection refused'(may retry after sleeping) Apr 12 19:07:19.851292 kubelet[1604]: E0412 19:07:19.851176 1604 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 19:07:19.851292 kubelet[1604]: E0412 19:07:19.851196 1604 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:07:19.852000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:19.852000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000715500 a1=c000cd3530 a2=c0007154d0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:19.855123 kubelet[1604]: I0412 19:07:19.855085 1604 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:07:19.853000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:19.853000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004554a0 a1=c000cd3548 a2=c000715590 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.853000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:19.855848 kubelet[1604]: I0412 19:07:19.855820 1604 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:07:19.856148 kubelet[1604]: I0412 19:07:19.856120 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:07:19.860115 kubelet[1604]: I0412 19:07:19.860078 1604 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 19:07:19.861149 kubelet[1604]: I0412 19:07:19.861101 1604 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 19:07:19.863970 kubelet[1604]: W0412 19:07:19.863522 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.96:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.863970 kubelet[1604]: E0412 19:07:19.863596 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.96:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.863970 kubelet[1604]: E0412 19:07:19.863708 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.96:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-5-ba19de9024.novalocal?timeout=10s\": dial tcp 172.24.4.96:6443: connect: connection refused" interval="200ms" Apr 12 19:07:19.879000 audit[1615]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.879000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed28ac1c0 a2=0 a3=7ffed28ac1ac items=0 ppid=1604 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:07:19.881000 audit[1616]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.881000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8b140a70 a2=0 a3=7ffe8b140a5c items=0 ppid=1604 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:07:19.885000 audit[1618]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.885000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2bb9d490 a2=0 a3=7ffc2bb9d47c items=0 ppid=1604 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:07:19.890000 audit[1620]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.890000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb92eaff0 a2=0 a3=7ffdb92eafdc items=0 ppid=1604 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:07:19.909000 audit[1625]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.909000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcf7efa870 a2=0 a3=7ffcf7efa85c items=0 ppid=1604 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:07:19.912161 kubelet[1604]: I0412 19:07:19.912125 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 19:07:19.913000 audit[1628]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.913000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed0b6bbd0 a2=0 a3=7ffed0b6bbbc items=0 ppid=1604 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:07:19.918099 kubelet[1604]: I0412 19:07:19.918067 1604 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:07:19.916000 audit[1630]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.916000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf80f75c0 a2=0 a3=7ffdf80f75ac items=0 ppid=1604 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:07:19.919395 kubelet[1604]: I0412 19:07:19.919368 1604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:07:19.919606 kubelet[1604]: I0412 19:07:19.919582 1604 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:07:19.918000 audit[1631]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:19.918000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce65f7d50 a2=0 a3=7ffce65f7d3c items=0 ppid=1604 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:07:19.919000 audit[1627]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:19.919000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe73aded30 a2=0 a3=7ffe73aded1c items=0 ppid=1604 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:07:19.921973 kubelet[1604]: I0412 19:07:19.921914 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 19:07:19.921973 kubelet[1604]: I0412 19:07:19.921955 1604 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 19:07:19.921973 kubelet[1604]: I0412 19:07:19.921977 1604 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 19:07:19.922157 kubelet[1604]: E0412 19:07:19.922039 1604 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:07:19.922990 kubelet[1604]: W0412 19:07:19.922953 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.96:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.923100 kubelet[1604]: E0412 19:07:19.923089 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.96:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:19.922000 audit[1632]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:19.922000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff5c1ee70 a2=0 a3=7ffff5c1ee5c items=0 ppid=1604 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:07:19.923000 audit[1634]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:19.923000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdd0687e00 a2=0 a3=7ffdd0687dec items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:07:19.925577 kubelet[1604]: I0412 19:07:19.925564 1604 policy_none.go:49] "None policy: Start" Apr 12 19:07:19.926179 kubelet[1604]: I0412 19:07:19.926168 1604 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 19:07:19.926276 kubelet[1604]: I0412 19:07:19.926265 1604 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:07:19.926000 audit[1635]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:19.926000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd905b14f0 a2=0 a3=7ffd905b14dc items=0 ppid=1604 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:07:19.932387 systemd[1]: Created slice kubepods.slice. Apr 12 19:07:19.937712 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:07:19.940794 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:07:19.946074 kubelet[1604]: I0412 19:07:19.946045 1604 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:07:19.944000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:19.944000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:19.944000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb8ff0 a1=c00079a9d8 a2=c000bb8fc0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:19.944000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:19.946466 kubelet[1604]: I0412 19:07:19.946127 1604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:07:19.946466 kubelet[1604]: I0412 19:07:19.946324 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:07:19.947668 kubelet[1604]: E0412 19:07:19.947605 1604 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-3-5-ba19de9024.novalocal\" not found" Apr 12 19:07:19.963615 kubelet[1604]: I0412 19:07:19.963516 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:19.964330 kubelet[1604]: E0412 19:07:19.964301 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.96:6443/api/v1/nodes\": dial tcp 172.24.4.96:6443: connect: connection refused" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.022533 kubelet[1604]: I0412 19:07:20.022432 1604 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:20.024375 kubelet[1604]: I0412 19:07:20.024358 1604 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:20.025653 kubelet[1604]: I0412 19:07:20.025638 1604 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:20.032568 systemd[1]: Created slice kubepods-burstable-pode3a0d18188ef143dd5d10cd7d7ca9a24.slice. Apr 12 19:07:20.040164 systemd[1]: Created slice kubepods-burstable-pod7d1aef794cbbacd36226b985e7916497.slice. Apr 12 19:07:20.045214 systemd[1]: Created slice kubepods-burstable-pod56774764237de687b83c19762daeeeea.slice. Apr 12 19:07:20.063416 kubelet[1604]: I0412 19:07:20.063392 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.063607 kubelet[1604]: I0412 19:07:20.063594 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.063718 kubelet[1604]: I0412 19:07:20.063706 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.063820 kubelet[1604]: I0412 19:07:20.063809 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/56774764237de687b83c19762daeeeea-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"56774764237de687b83c19762daeeeea\") " pod="kube-system/kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.063916 kubelet[1604]: I0412 19:07:20.063905 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.064009 kubelet[1604]: I0412 19:07:20.063999 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.064093 kubelet[1604]: I0412 19:07:20.064083 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.064179 kubelet[1604]: I0412 19:07:20.064170 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.064303 kubelet[1604]: I0412 19:07:20.064292 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.064911 kubelet[1604]: E0412 19:07:20.064898 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.96:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-5-ba19de9024.novalocal?timeout=10s\": dial tcp 172.24.4.96:6443: connect: connection refused" interval="400ms" Apr 12 19:07:20.168009 kubelet[1604]: I0412 19:07:20.167936 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.168991 kubelet[1604]: E0412 19:07:20.168927 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.96:6443/api/v1/nodes\": dial tcp 172.24.4.96:6443: connect: connection refused" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.340350 env[1054]: time="2024-04-12T19:07:20.340083360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal,Uid:e3a0d18188ef143dd5d10cd7d7ca9a24,Namespace:kube-system,Attempt:0,}" Apr 12 19:07:20.346627 env[1054]: time="2024-04-12T19:07:20.345518999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal,Uid:7d1aef794cbbacd36226b985e7916497,Namespace:kube-system,Attempt:0,}" Apr 12 19:07:20.349298 env[1054]: time="2024-04-12T19:07:20.349185667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal,Uid:56774764237de687b83c19762daeeeea,Namespace:kube-system,Attempt:0,}" Apr 12 19:07:20.467132 kubelet[1604]: E0412 19:07:20.466148 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.96:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-5-ba19de9024.novalocal?timeout=10s\": dial tcp 172.24.4.96:6443: connect: connection refused" interval="800ms" Apr 12 19:07:20.574984 kubelet[1604]: I0412 19:07:20.574917 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.576382 kubelet[1604]: E0412 19:07:20.575636 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.96:6443/api/v1/nodes\": dial tcp 172.24.4.96:6443: connect: connection refused" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:20.852521 kubelet[1604]: W0412 19:07:20.852469 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:20.907649 kubelet[1604]: E0412 19:07:20.852657 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.105162 kubelet[1604]: W0412 19:07:21.104921 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.96:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.105162 kubelet[1604]: E0412 19:07:21.105017 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.96:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.267893 kubelet[1604]: E0412 19:07:21.267813 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.96:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-5-ba19de9024.novalocal?timeout=10s\": dial tcp 172.24.4.96:6443: connect: connection refused" interval="1.6s" Apr 12 19:07:21.334200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4091469844.mount: Deactivated successfully. Apr 12 19:07:21.347985 env[1054]: time="2024-04-12T19:07:21.347856333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.354288 env[1054]: time="2024-04-12T19:07:21.354181693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.357286 env[1054]: time="2024-04-12T19:07:21.357057654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.361578 kubelet[1604]: W0412 19:07:21.361450 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.96:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.361760 kubelet[1604]: E0412 19:07:21.361589 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.96:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.364724 env[1054]: time="2024-04-12T19:07:21.364665202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.366843 env[1054]: time="2024-04-12T19:07:21.366775216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.369090 env[1054]: time="2024-04-12T19:07:21.369036713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.378994 kubelet[1604]: I0412 19:07:21.378418 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:21.379331 kubelet[1604]: E0412 19:07:21.379194 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.96:6443/api/v1/nodes\": dial tcp 172.24.4.96:6443: connect: connection refused" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:21.379688 env[1054]: time="2024-04-12T19:07:21.379629017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.388079 env[1054]: time="2024-04-12T19:07:21.387981895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.390995 env[1054]: time="2024-04-12T19:07:21.390917418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.394457 env[1054]: time="2024-04-12T19:07:21.394379280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.397560 env[1054]: time="2024-04-12T19:07:21.397505431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.400300 env[1054]: time="2024-04-12T19:07:21.400193830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:21.459327 kubelet[1604]: W0412 19:07:21.459213 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.96:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.459327 kubelet[1604]: E0412 19:07:21.459290 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.96:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:21.460789 env[1054]: time="2024-04-12T19:07:21.460688307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:21.460941 env[1054]: time="2024-04-12T19:07:21.460786662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:21.460941 env[1054]: time="2024-04-12T19:07:21.460803754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:21.461082 env[1054]: time="2024-04-12T19:07:21.460976799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/812fea5db86482c6cae1ca5f9578155b36bb1b772c10a213d0778899cc471e47 pid=1650 runtime=io.containerd.runc.v2 Apr 12 19:07:21.478113 systemd[1]: Started cri-containerd-812fea5db86482c6cae1ca5f9578155b36bb1b772c10a213d0778899cc471e47.scope. Apr 12 19:07:21.493858 env[1054]: time="2024-04-12T19:07:21.493690429Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:21.493858 env[1054]: time="2024-04-12T19:07:21.493796849Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:21.494283 env[1054]: time="2024-04-12T19:07:21.494184808Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:21.494787 env[1054]: time="2024-04-12T19:07:21.494729090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6be7aafbfc5c71362bb3f2623101bcb7aeb647e9a4454e8546b37738a0559bcd pid=1657 runtime=io.containerd.runc.v2 Apr 12 19:07:21.516364 env[1054]: time="2024-04-12T19:07:21.516218850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:21.516364 env[1054]: time="2024-04-12T19:07:21.516304542Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:21.516364 env[1054]: time="2024-04-12T19:07:21.516320191Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:21.516873 env[1054]: time="2024-04-12T19:07:21.516784183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ffe0c2290ade9fbf7e420157bfbdd2f94973d69efa3989404f88f3d7e6e6e77 pid=1697 runtime=io.containerd.runc.v2 Apr 12 19:07:21.524975 systemd[1]: Started cri-containerd-6be7aafbfc5c71362bb3f2623101bcb7aeb647e9a4454e8546b37738a0559bcd.scope. Apr 12 19:07:21.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.534000 audit: BPF prog-id=67 op=LOAD Apr 12 19:07:21.535000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.535000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1650 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326665613564623836343832633663616531636135663935373831 Apr 12 19:07:21.535000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.535000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1650 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326665613564623836343832633663616531636135663935373831 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.537000 audit: BPF prog-id=68 op=LOAD Apr 12 19:07:21.537000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000258e0 items=0 ppid=1650 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326665613564623836343832633663616531636135663935373831 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit: BPF prog-id=69 op=LOAD Apr 12 19:07:21.539000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025928 items=0 ppid=1650 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326665613564623836343832633663616531636135663935373831 Apr 12 19:07:21.539000 audit: BPF prog-id=69 op=UNLOAD Apr 12 19:07:21.539000 audit: BPF prog-id=68 op=UNLOAD Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.539000 audit: BPF prog-id=70 op=LOAD Apr 12 19:07:21.539000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025d38 items=0 ppid=1650 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326665613564623836343832633663616531636135663935373831 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.548000 audit: BPF prog-id=71 op=LOAD Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1657 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662653761616662666335633731333632626233663236323331303162 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1657 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662653761616662666335633731333632626233663236323331303162 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit: BPF prog-id=72 op=LOAD Apr 12 19:07:21.549000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216520 items=0 ppid=1657 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662653761616662666335633731333632626233663236323331303162 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit: BPF prog-id=73 op=LOAD Apr 12 19:07:21.549000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216568 items=0 ppid=1657 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662653761616662666335633731333632626233663236323331303162 Apr 12 19:07:21.549000 audit: BPF prog-id=73 op=UNLOAD Apr 12 19:07:21.549000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.549000 audit: BPF prog-id=74 op=LOAD Apr 12 19:07:21.549000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216978 items=0 ppid=1657 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662653761616662666335633731333632626233663236323331303162 Apr 12 19:07:21.566859 systemd[1]: Started cri-containerd-3ffe0c2290ade9fbf7e420157bfbdd2f94973d69efa3989404f88f3d7e6e6e77.scope. Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.593000 audit: BPF prog-id=75 op=LOAD Apr 12 19:07:21.595000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.595000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666530633232393061646539666266376534323031353762666264 Apr 12 19:07:21.595000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.595000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666530633232393061646539666266376534323031353762666264 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.596000 audit: BPF prog-id=76 op=LOAD Apr 12 19:07:21.596000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000280f20 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666530633232393061646539666266376534323031353762666264 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.598000 audit: BPF prog-id=77 op=LOAD Apr 12 19:07:21.598000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000280f68 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666530633232393061646539666266376534323031353762666264 Apr 12 19:07:21.599000 audit: BPF prog-id=77 op=UNLOAD Apr 12 19:07:21.599000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.599000 audit: BPF prog-id=78 op=LOAD Apr 12 19:07:21.599000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000281378 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666530633232393061646539666266376534323031353762666264 Apr 12 19:07:21.618474 env[1054]: time="2024-04-12T19:07:21.618307337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal,Uid:e3a0d18188ef143dd5d10cd7d7ca9a24,Namespace:kube-system,Attempt:0,} returns sandbox id \"812fea5db86482c6cae1ca5f9578155b36bb1b772c10a213d0778899cc471e47\"" Apr 12 19:07:21.630741 env[1054]: time="2024-04-12T19:07:21.630686607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal,Uid:56774764237de687b83c19762daeeeea,Namespace:kube-system,Attempt:0,} returns sandbox id \"6be7aafbfc5c71362bb3f2623101bcb7aeb647e9a4454e8546b37738a0559bcd\"" Apr 12 19:07:21.631104 env[1054]: time="2024-04-12T19:07:21.631026756Z" level=info msg="CreateContainer within sandbox \"812fea5db86482c6cae1ca5f9578155b36bb1b772c10a213d0778899cc471e47\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 19:07:21.638187 env[1054]: time="2024-04-12T19:07:21.638119566Z" level=info msg="CreateContainer within sandbox \"6be7aafbfc5c71362bb3f2623101bcb7aeb647e9a4454e8546b37738a0559bcd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 19:07:21.665762 env[1054]: time="2024-04-12T19:07:21.665713842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal,Uid:7d1aef794cbbacd36226b985e7916497,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ffe0c2290ade9fbf7e420157bfbdd2f94973d69efa3989404f88f3d7e6e6e77\"" Apr 12 19:07:21.668836 env[1054]: time="2024-04-12T19:07:21.668782696Z" level=info msg="CreateContainer within sandbox \"3ffe0c2290ade9fbf7e420157bfbdd2f94973d69efa3989404f88f3d7e6e6e77\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 19:07:21.679133 env[1054]: time="2024-04-12T19:07:21.679079244Z" level=info msg="CreateContainer within sandbox \"812fea5db86482c6cae1ca5f9578155b36bb1b772c10a213d0778899cc471e47\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f613c7737c68cfa3c70f696340ac9ff68ece45b71b7b53778310bae324f36136\"" Apr 12 19:07:21.681002 env[1054]: time="2024-04-12T19:07:21.680956099Z" level=info msg="StartContainer for \"f613c7737c68cfa3c70f696340ac9ff68ece45b71b7b53778310bae324f36136\"" Apr 12 19:07:21.692036 env[1054]: time="2024-04-12T19:07:21.691900494Z" level=info msg="CreateContainer within sandbox \"6be7aafbfc5c71362bb3f2623101bcb7aeb647e9a4454e8546b37738a0559bcd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"870646cc9a8d834d6d17c48aa73ddb408cf30b9d69766c27cd118bb0504ff6e1\"" Apr 12 19:07:21.692926 env[1054]: time="2024-04-12T19:07:21.692881217Z" level=info msg="StartContainer for \"870646cc9a8d834d6d17c48aa73ddb408cf30b9d69766c27cd118bb0504ff6e1\"" Apr 12 19:07:21.707913 systemd[1]: Started cri-containerd-f613c7737c68cfa3c70f696340ac9ff68ece45b71b7b53778310bae324f36136.scope. Apr 12 19:07:21.709622 env[1054]: time="2024-04-12T19:07:21.709472027Z" level=info msg="CreateContainer within sandbox \"3ffe0c2290ade9fbf7e420157bfbdd2f94973d69efa3989404f88f3d7e6e6e77\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"9fbcea6f75d08561fb192ed1ec6b39deebd55b19220a5a571e00967502f1a5b2\"" Apr 12 19:07:21.712649 env[1054]: time="2024-04-12T19:07:21.712613026Z" level=info msg="StartContainer for \"9fbcea6f75d08561fb192ed1ec6b39deebd55b19220a5a571e00967502f1a5b2\"" Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.728000 audit: BPF prog-id=79 op=LOAD Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1650 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636313363373733376336386366613363373066363936333430616339 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1650 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636313363373733376336386366613363373066363936333430616339 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit: BPF prog-id=80 op=LOAD Apr 12 19:07:21.730000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000108ab0 items=0 ppid=1650 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636313363373733376336386366613363373066363936333430616339 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit: BPF prog-id=81 op=LOAD Apr 12 19:07:21.730000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000108af8 items=0 ppid=1650 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636313363373733376336386366613363373066363936333430616339 Apr 12 19:07:21.730000 audit: BPF prog-id=81 op=UNLOAD Apr 12 19:07:21.730000 audit: BPF prog-id=80 op=UNLOAD Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.730000 audit: BPF prog-id=82 op=LOAD Apr 12 19:07:21.730000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000108f08 items=0 ppid=1650 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636313363373733376336386366613363373066363936333430616339 Apr 12 19:07:21.750732 systemd[1]: Started cri-containerd-870646cc9a8d834d6d17c48aa73ddb408cf30b9d69766c27cd118bb0504ff6e1.scope. Apr 12 19:07:21.754470 systemd[1]: Started cri-containerd-9fbcea6f75d08561fb192ed1ec6b39deebd55b19220a5a571e00967502f1a5b2.scope. Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.779000 audit: BPF prog-id=83 op=LOAD Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303634366363396138643833346436643137633438616137336464 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303634366363396138643833346436643137633438616137336464 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.780000 audit: BPF prog-id=84 op=LOAD Apr 12 19:07:21.780000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000239130 items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303634366363396138643833346436643137633438616137336464 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.781000 audit: BPF prog-id=85 op=LOAD Apr 12 19:07:21.781000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000239178 items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303634366363396138643833346436643137633438616137336464 Apr 12 19:07:21.782000 audit: BPF prog-id=85 op=UNLOAD Apr 12 19:07:21.782000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.782000 audit: BPF prog-id=86 op=LOAD Apr 12 19:07:21.782000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000239588 items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303634366363396138643833346436643137633438616137336464 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.804709 env[1054]: time="2024-04-12T19:07:21.804644804Z" level=info msg="StartContainer for \"f613c7737c68cfa3c70f696340ac9ff68ece45b71b7b53778310bae324f36136\" returns successfully" Apr 12 19:07:21.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.803000 audit: BPF prog-id=87 op=LOAD Apr 12 19:07:21.804000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.804000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1697 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626365613666373564303835363166623139326564316563366233 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1697 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626365613666373564303835363166623139326564316563366233 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.805000 audit: BPF prog-id=88 op=LOAD Apr 12 19:07:21.805000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5df0 items=0 ppid=1697 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626365613666373564303835363166623139326564316563366233 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.806000 audit: BPF prog-id=89 op=LOAD Apr 12 19:07:21.806000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e38 items=0 ppid=1697 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626365613666373564303835363166623139326564316563366233 Apr 12 19:07:21.807000 audit: BPF prog-id=89 op=UNLOAD Apr 12 19:07:21.807000 audit: BPF prog-id=88 op=UNLOAD Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:21.807000 audit: BPF prog-id=90 op=LOAD Apr 12 19:07:21.807000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4248 items=0 ppid=1697 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:21.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626365613666373564303835363166623139326564316563366233 Apr 12 19:07:21.839088 env[1054]: time="2024-04-12T19:07:21.839006300Z" level=info msg="StartContainer for \"870646cc9a8d834d6d17c48aa73ddb408cf30b9d69766c27cd118bb0504ff6e1\" returns successfully" Apr 12 19:07:21.860641 env[1054]: time="2024-04-12T19:07:21.860578355Z" level=info msg="StartContainer for \"9fbcea6f75d08561fb192ed1ec6b39deebd55b19220a5a571e00967502f1a5b2\" returns successfully" Apr 12 19:07:21.879681 kubelet[1604]: E0412 19:07:21.879523 1604 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.96:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:22.093223 kubelet[1604]: E0412 19:07:22.093119 1604 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-3-5-ba19de9024.novalocal.17c59de4ed8c2e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-3-5-ba19de9024.novalocal", UID:"ci-3510-3-3-5-ba19de9024.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-3-5-ba19de9024.novalocal"}, FirstTimestamp:time.Date(2024, time.April, 12, 19, 7, 19, 847833131, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 19, 7, 19, 847833131, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.24.4.96:6443/api/v1/namespaces/default/events": dial tcp 172.24.4.96:6443: connect: connection refused'(may retry after sleeping) Apr 12 19:07:22.868229 kubelet[1604]: E0412 19:07:22.868198 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.96:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-5-ba19de9024.novalocal?timeout=10s\": dial tcp 172.24.4.96:6443: connect: connection refused" interval="3.2s" Apr 12 19:07:22.942472 kubelet[1604]: W0412 19:07:22.942439 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:22.943328 kubelet[1604]: E0412 19:07:22.943316 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.96:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-5-ba19de9024.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.96:6443: connect: connection refused Apr 12 19:07:22.981540 kubelet[1604]: I0412 19:07:22.981516 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:22.982084 kubelet[1604]: E0412 19:07:22.982074 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.96:6443/api/v1/nodes\": dial tcp 172.24.4.96:6443: connect: connection refused" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:23.080000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:23.080000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cc2000 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:23.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:23.080000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:23.080000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cb8040 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:23.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:25.435000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.438941 kernel: kauditd_printk_skb: 643 callbacks suppressed Apr 12 19:07:25.439007 kernel: audit: type=1400 audit(1712948845.435:659): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.436000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.459831 kernel: audit: type=1400 audit(1712948845.436:660): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.436000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c000c3efc0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.487282 kernel: audit: type=1300 audit(1712948845.436:660): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c000c3efc0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.436000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.506267 kernel: audit: type=1327 audit(1712948845.436:660): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.435000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c001364060 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.514266 kernel: audit: type=1300 audit(1712948845.435:659): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c001364060 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.435000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.437000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.525454 kernel: audit: type=1327 audit(1712948845.435:659): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.525500 kernel: audit: type=1400 audit(1712948845.437:661): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.437000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00767e040 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.538579 kernel: audit: type=1300 audit(1712948845.437:661): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00767e040 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.538630 kernel: audit: type=1327 audit(1712948845.437:661): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.440000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.543271 kernel: audit: type=1400 audit(1712948845.440:662): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.440000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c000da2330 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.440000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.463000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.463000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00466b1e0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:25.463000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:25.463000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0031a1cb0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:07:25.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:07:26.030072 kubelet[1604]: E0412 19:07:26.030023 1604 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510-3-3-5-ba19de9024.novalocal" not found Apr 12 19:07:26.079640 kubelet[1604]: E0412 19:07:26.079593 1604 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-3-5-ba19de9024.novalocal\" not found" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:26.185182 kubelet[1604]: I0412 19:07:26.185120 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:26.200518 kubelet[1604]: I0412 19:07:26.200465 1604 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:26.218548 kubelet[1604]: E0412 19:07:26.218500 1604 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-5-ba19de9024.novalocal\" not found" Apr 12 19:07:26.850694 kubelet[1604]: I0412 19:07:26.850599 1604 apiserver.go:52] "Watching apiserver" Apr 12 19:07:26.862337 kubelet[1604]: I0412 19:07:26.862287 1604 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 19:07:26.909344 kubelet[1604]: I0412 19:07:26.909292 1604 reconciler.go:41] "Reconciler: start to sync state" Apr 12 19:07:28.588214 systemd[1]: Reloading. Apr 12 19:07:28.716646 /usr/lib/systemd/system-generators/torcx-generator[1894]: time="2024-04-12T19:07:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:07:28.723480 /usr/lib/systemd/system-generators/torcx-generator[1894]: time="2024-04-12T19:07:28Z" level=info msg="torcx already run" Apr 12 19:07:28.795657 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:07:28.795852 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:07:28.819170 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit: BPF prog-id=91 op=LOAD Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.917000 audit: BPF prog-id=92 op=LOAD Apr 12 19:07:28.917000 audit: BPF prog-id=52 op=UNLOAD Apr 12 19:07:28.917000 audit: BPF prog-id=53 op=UNLOAD Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.919000 audit: BPF prog-id=93 op=LOAD Apr 12 19:07:28.919000 audit: BPF prog-id=75 op=UNLOAD Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.921000 audit: BPF prog-id=94 op=LOAD Apr 12 19:07:28.921000 audit: BPF prog-id=87 op=UNLOAD Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.923000 audit: BPF prog-id=95 op=LOAD Apr 12 19:07:28.924000 audit: BPF prog-id=54 op=UNLOAD Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit: BPF prog-id=96 op=LOAD Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.925000 audit: BPF prog-id=97 op=LOAD Apr 12 19:07:28.926000 audit: BPF prog-id=55 op=UNLOAD Apr 12 19:07:28.926000 audit: BPF prog-id=56 op=UNLOAD Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.928000 audit: BPF prog-id=98 op=LOAD Apr 12 19:07:28.928000 audit: BPF prog-id=71 op=UNLOAD Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.929000 audit: BPF prog-id=99 op=LOAD Apr 12 19:07:28.929000 audit: BPF prog-id=79 op=UNLOAD Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit: BPF prog-id=100 op=LOAD Apr 12 19:07:28.932000 audit: BPF prog-id=57 op=UNLOAD Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit: BPF prog-id=101 op=LOAD Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.933000 audit: BPF prog-id=102 op=LOAD Apr 12 19:07:28.934000 audit: BPF prog-id=58 op=UNLOAD Apr 12 19:07:28.934000 audit: BPF prog-id=59 op=UNLOAD Apr 12 19:07:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.936000 audit: BPF prog-id=103 op=LOAD Apr 12 19:07:28.936000 audit: BPF prog-id=60 op=UNLOAD Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.938000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:28.938000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99920 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:28.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.938000 audit: BPF prog-id=104 op=LOAD Apr 12 19:07:28.938000 audit: BPF prog-id=61 op=UNLOAD Apr 12 19:07:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.939000 audit: BPF prog-id=105 op=LOAD Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.941000 audit: BPF prog-id=106 op=LOAD Apr 12 19:07:28.941000 audit: BPF prog-id=62 op=UNLOAD Apr 12 19:07:28.942000 audit: BPF prog-id=63 op=UNLOAD Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit: BPF prog-id=107 op=LOAD Apr 12 19:07:28.944000 audit: BPF prog-id=64 op=UNLOAD Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.945000 audit: BPF prog-id=108 op=LOAD Apr 12 19:07:28.946000 audit: BPF prog-id=65 op=UNLOAD Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.947000 audit: BPF prog-id=109 op=LOAD Apr 12 19:07:28.947000 audit: BPF prog-id=66 op=UNLOAD Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.950000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:28.950000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005772c0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:28.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:28.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.950000 audit: BPF prog-id=110 op=LOAD Apr 12 19:07:28.950000 audit: BPF prog-id=83 op=UNLOAD Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:28.952000 audit: BPF prog-id=111 op=LOAD Apr 12 19:07:28.953000 audit: BPF prog-id=67 op=UNLOAD Apr 12 19:07:28.960000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:28.960000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99c20 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:28.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:28.969000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:07:28.969000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009ec020 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:28.969000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:28.975418 kubelet[1604]: I0412 19:07:28.975380 1604 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:07:28.976071 systemd[1]: Stopping kubelet.service... Apr 12 19:07:28.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:28.989813 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 19:07:28.990070 systemd[1]: Stopped kubelet.service. Apr 12 19:07:28.993151 systemd[1]: Started kubelet.service. Apr 12 19:07:28.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:29.098793 kubelet[1941]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:07:29.099149 kubelet[1941]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:07:29.099204 kubelet[1941]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:07:29.099362 kubelet[1941]: I0412 19:07:29.099331 1941 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:07:29.107983 kubelet[1941]: I0412 19:07:29.107935 1941 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 19:07:29.107983 kubelet[1941]: I0412 19:07:29.107973 1941 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:07:29.108276 kubelet[1941]: I0412 19:07:29.108232 1941 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 19:07:29.111723 kubelet[1941]: I0412 19:07:29.111704 1941 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 19:07:29.116157 kubelet[1941]: I0412 19:07:29.116132 1941 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:07:29.116545 kubelet[1941]: I0412 19:07:29.116480 1941 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:07:29.116888 kubelet[1941]: I0412 19:07:29.116836 1941 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:07:29.117082 kubelet[1941]: I0412 19:07:29.117065 1941 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 19:07:29.117230 kubelet[1941]: I0412 19:07:29.117218 1941 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 19:07:29.117331 kubelet[1941]: I0412 19:07:29.117321 1941 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 19:07:29.117419 kubelet[1941]: I0412 19:07:29.117408 1941 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:07:29.121509 kubelet[1941]: I0412 19:07:29.121487 1941 kubelet.go:405] "Attempting to sync node with API server" Apr 12 19:07:29.121599 kubelet[1941]: I0412 19:07:29.121516 1941 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:07:29.121599 kubelet[1941]: I0412 19:07:29.121539 1941 kubelet.go:309] "Adding apiserver pod source" Apr 12 19:07:29.121599 kubelet[1941]: I0412 19:07:29.121559 1941 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:07:29.126630 kubelet[1941]: I0412 19:07:29.126595 1941 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:07:29.127410 kubelet[1941]: I0412 19:07:29.127387 1941 server.go:1168] "Started kubelet" Apr 12 19:07:29.131000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:29.131000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:29.131000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ee8330 a1=c000b09938 a2=c000ee8300 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:29.131000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:29.131000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:29.131000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:29.131000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e94da0 a1=c000b09950 a2=c000ee83c0 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:29.131000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:29.133018 kubelet[1941]: I0412 19:07:29.132699 1941 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:07:29.133018 kubelet[1941]: I0412 19:07:29.132762 1941 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:07:29.133018 kubelet[1941]: I0412 19:07:29.132788 1941 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:07:29.144304 kubelet[1941]: I0412 19:07:29.142403 1941 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 19:07:29.144304 kubelet[1941]: I0412 19:07:29.143517 1941 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 19:07:29.151856 kubelet[1941]: I0412 19:07:29.151823 1941 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:07:29.153169 kubelet[1941]: I0412 19:07:29.152703 1941 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:07:29.154108 kubelet[1941]: I0412 19:07:29.154091 1941 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 19:07:29.160365 kubelet[1941]: E0412 19:07:29.160345 1941 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 19:07:29.160482 kubelet[1941]: E0412 19:07:29.160471 1941 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:07:29.182099 kubelet[1941]: I0412 19:07:29.176432 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 19:07:29.182099 kubelet[1941]: I0412 19:07:29.177346 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 19:07:29.182099 kubelet[1941]: I0412 19:07:29.177625 1941 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 19:07:29.182099 kubelet[1941]: I0412 19:07:29.177660 1941 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 19:07:29.182099 kubelet[1941]: E0412 19:07:29.177714 1941 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:07:29.256019 kubelet[1941]: I0412 19:07:29.255976 1941 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.278507 kubelet[1941]: E0412 19:07:29.278449 1941 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 19:07:29.278813 kubelet[1941]: I0412 19:07:29.278786 1941 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.278901 kubelet[1941]: I0412 19:07:29.278879 1941 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.290793 kubelet[1941]: I0412 19:07:29.290770 1941 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:07:29.291370 kubelet[1941]: I0412 19:07:29.291357 1941 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:07:29.291445 kubelet[1941]: I0412 19:07:29.291435 1941 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:07:29.291752 kubelet[1941]: I0412 19:07:29.291740 1941 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 19:07:29.291822 kubelet[1941]: I0412 19:07:29.291814 1941 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 19:07:29.291882 kubelet[1941]: I0412 19:07:29.291874 1941 policy_none.go:49] "None policy: Start" Apr 12 19:07:29.297881 kubelet[1941]: I0412 19:07:29.297859 1941 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 19:07:29.298042 kubelet[1941]: I0412 19:07:29.298033 1941 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:07:29.299859 kubelet[1941]: I0412 19:07:29.299840 1941 state_mem.go:75] "Updated machine memory state" Apr 12 19:07:29.304141 kubelet[1941]: I0412 19:07:29.304113 1941 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:07:29.304227 kubelet[1941]: I0412 19:07:29.304198 1941 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:07:29.302000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:29.302000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:07:29.302000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e269f0 a1=c000b08b70 a2=c000e269c0 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:29.302000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:07:29.306037 kubelet[1941]: I0412 19:07:29.305214 1941 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:07:29.479436 kubelet[1941]: I0412 19:07:29.479291 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:29.479830 kubelet[1941]: I0412 19:07:29.479808 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:29.480066 kubelet[1941]: I0412 19:07:29.480043 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:29.505272 kubelet[1941]: W0412 19:07:29.505226 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:07:29.507959 kubelet[1941]: W0412 19:07:29.507917 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:07:29.510589 kubelet[1941]: W0412 19:07:29.510566 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:07:29.645126 kubelet[1941]: I0412 19:07:29.645081 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.645539 kubelet[1941]: I0412 19:07:29.645516 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.645775 kubelet[1941]: I0412 19:07:29.645753 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/56774764237de687b83c19762daeeeea-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"56774764237de687b83c19762daeeeea\") " pod="kube-system/kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.645998 kubelet[1941]: I0412 19:07:29.645970 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.646233 kubelet[1941]: I0412 19:07:29.646212 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.646506 kubelet[1941]: I0412 19:07:29.646484 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e3a0d18188ef143dd5d10cd7d7ca9a24-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"e3a0d18188ef143dd5d10cd7d7ca9a24\") " pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.646737 kubelet[1941]: I0412 19:07:29.646716 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.646961 kubelet[1941]: I0412 19:07:29.646940 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:29.647183 kubelet[1941]: I0412 19:07:29.647163 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7d1aef794cbbacd36226b985e7916497-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal\" (UID: \"7d1aef794cbbacd36226b985e7916497\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:07:30.122580 kubelet[1941]: I0412 19:07:30.122541 1941 apiserver.go:52] "Watching apiserver" Apr 12 19:07:30.144599 kubelet[1941]: I0412 19:07:30.144543 1941 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 19:07:30.151131 kubelet[1941]: I0412 19:07:30.150857 1941 reconciler.go:41] "Reconciler: start to sync state" Apr 12 19:07:30.385952 kubelet[1941]: I0412 19:07:30.385812 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-3-5-ba19de9024.novalocal" podStartSLOduration=1.383618859 podCreationTimestamp="2024-04-12 19:07:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:07:30.344317341 +0000 UTC m=+1.336624418" watchObservedRunningTime="2024-04-12 19:07:30.383618859 +0000 UTC m=+1.375925935" Apr 12 19:07:30.410251 kubelet[1941]: I0412 19:07:30.410192 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-3-5-ba19de9024.novalocal" podStartSLOduration=1.410121594 podCreationTimestamp="2024-04-12 19:07:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:07:30.385973249 +0000 UTC m=+1.378280325" watchObservedRunningTime="2024-04-12 19:07:30.410121594 +0000 UTC m=+1.402428670" Apr 12 19:07:30.472009 kubelet[1941]: I0412 19:07:30.471965 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-3-5-ba19de9024.novalocal" podStartSLOduration=1.471890964 podCreationTimestamp="2024-04-12 19:07:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:07:30.412249147 +0000 UTC m=+1.404556233" watchObservedRunningTime="2024-04-12 19:07:30.471890964 +0000 UTC m=+1.464198051" Apr 12 19:07:33.692585 sudo[1197]: pam_unix(sudo:session): session closed for user root Apr 12 19:07:33.696293 kernel: kauditd_printk_skb: 278 callbacks suppressed Apr 12 19:07:33.696515 kernel: audit: type=1106 audit(1712948853.691:918): pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.691000 audit[1197]: USER_END pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.691000 audit[1197]: CRED_DISP pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.715369 kernel: audit: type=1104 audit(1712948853.691:919): pid=1197 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.907219 sshd[1193]: pam_unix(sshd:session): session closed for user core Apr 12 19:07:33.909000 audit[1193]: USER_END pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:07:33.909000 audit[1193]: CRED_DISP pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:07:33.934061 kernel: audit: type=1106 audit(1712948853.909:920): pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:07:33.934191 kernel: audit: type=1104 audit(1712948853.909:921): pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:07:33.944102 systemd[1]: sshd@6-172.24.4.96:22-172.24.4.1:47014.service: Deactivated successfully. Apr 12 19:07:33.957400 kernel: audit: type=1131 audit(1712948853.943:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.96:22-172.24.4.1:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.96:22-172.24.4.1:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:07:33.945933 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:07:33.946315 systemd[1]: session-7.scope: Consumed 6.537s CPU time. Apr 12 19:07:33.956170 systemd-logind[1047]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:07:33.958947 systemd-logind[1047]: Removed session 7. Apr 12 19:07:40.744000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524863 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 19:07:40.744000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009fcf80 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:40.770864 kernel: audit: type=1400 audit(1712948860.744:923): avc: denied { watch } for pid=1828 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524863 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 19:07:40.771078 kernel: audit: type=1300 audit(1712948860.744:923): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009fcf80 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:07:40.771159 kernel: audit: type=1327 audit(1712948860.744:923): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:40.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:07:42.150275 kubelet[1941]: I0412 19:07:42.150211 1941 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 19:07:42.151017 env[1054]: time="2024-04-12T19:07:42.150944018Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:07:42.151532 kubelet[1941]: I0412 19:07:42.151508 1941 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 19:07:42.688058 kubelet[1941]: I0412 19:07:42.688007 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:42.699136 systemd[1]: Created slice kubepods-besteffort-poddfa55e21_fefb_49d1_806d_d369cbbfb09e.slice. Apr 12 19:07:42.734586 kubelet[1941]: I0412 19:07:42.734514 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dfa55e21-fefb-49d1-806d-d369cbbfb09e-kube-proxy\") pod \"kube-proxy-9qd52\" (UID: \"dfa55e21-fefb-49d1-806d-d369cbbfb09e\") " pod="kube-system/kube-proxy-9qd52" Apr 12 19:07:42.735025 kubelet[1941]: I0412 19:07:42.734998 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dfa55e21-fefb-49d1-806d-d369cbbfb09e-lib-modules\") pod \"kube-proxy-9qd52\" (UID: \"dfa55e21-fefb-49d1-806d-d369cbbfb09e\") " pod="kube-system/kube-proxy-9qd52" Apr 12 19:07:42.735334 kubelet[1941]: I0412 19:07:42.735303 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4n6hj\" (UniqueName: \"kubernetes.io/projected/dfa55e21-fefb-49d1-806d-d369cbbfb09e-kube-api-access-4n6hj\") pod \"kube-proxy-9qd52\" (UID: \"dfa55e21-fefb-49d1-806d-d369cbbfb09e\") " pod="kube-system/kube-proxy-9qd52" Apr 12 19:07:42.735603 kubelet[1941]: I0412 19:07:42.735575 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dfa55e21-fefb-49d1-806d-d369cbbfb09e-xtables-lock\") pod \"kube-proxy-9qd52\" (UID: \"dfa55e21-fefb-49d1-806d-d369cbbfb09e\") " pod="kube-system/kube-proxy-9qd52" Apr 12 19:07:42.855474 kubelet[1941]: E0412 19:07:42.855430 1941 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Apr 12 19:07:42.855768 kubelet[1941]: E0412 19:07:42.855747 1941 projected.go:198] Error preparing data for projected volume kube-api-access-4n6hj for pod kube-system/kube-proxy-9qd52: configmap "kube-root-ca.crt" not found Apr 12 19:07:42.856026 kubelet[1941]: E0412 19:07:42.856004 1941 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/dfa55e21-fefb-49d1-806d-d369cbbfb09e-kube-api-access-4n6hj podName:dfa55e21-fefb-49d1-806d-d369cbbfb09e nodeName:}" failed. No retries permitted until 2024-04-12 19:07:43.355964152 +0000 UTC m=+14.348271258 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4n6hj" (UniqueName: "kubernetes.io/projected/dfa55e21-fefb-49d1-806d-d369cbbfb09e-kube-api-access-4n6hj") pod "kube-proxy-9qd52" (UID: "dfa55e21-fefb-49d1-806d-d369cbbfb09e") : configmap "kube-root-ca.crt" not found Apr 12 19:07:43.101775 kubelet[1941]: I0412 19:07:43.101745 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:43.106887 systemd[1]: Created slice kubepods-besteffort-pode9478e58_3780_4434_8435_f98d925d0506.slice. Apr 12 19:07:43.138393 kubelet[1941]: I0412 19:07:43.138366 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e9478e58-3780-4434-8435-f98d925d0506-var-lib-calico\") pod \"tigera-operator-786dc9d695-cxhqm\" (UID: \"e9478e58-3780-4434-8435-f98d925d0506\") " pod="tigera-operator/tigera-operator-786dc9d695-cxhqm" Apr 12 19:07:43.138642 kubelet[1941]: I0412 19:07:43.138630 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-47t4n\" (UniqueName: \"kubernetes.io/projected/e9478e58-3780-4434-8435-f98d925d0506-kube-api-access-47t4n\") pod \"tigera-operator-786dc9d695-cxhqm\" (UID: \"e9478e58-3780-4434-8435-f98d925d0506\") " pod="tigera-operator/tigera-operator-786dc9d695-cxhqm" Apr 12 19:07:43.417337 env[1054]: time="2024-04-12T19:07:43.415521324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-cxhqm,Uid:e9478e58-3780-4434-8435-f98d925d0506,Namespace:tigera-operator,Attempt:0,}" Apr 12 19:07:43.504507 env[1054]: time="2024-04-12T19:07:43.504358725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:43.505390 env[1054]: time="2024-04-12T19:07:43.504455146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:43.505390 env[1054]: time="2024-04-12T19:07:43.504488929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:43.505390 env[1054]: time="2024-04-12T19:07:43.504949103Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b pid=2023 runtime=io.containerd.runc.v2 Apr 12 19:07:43.551814 systemd[1]: Started cri-containerd-79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b.scope. Apr 12 19:07:43.579076 kernel: audit: type=1400 audit(1712948863.571:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579182 kernel: audit: type=1400 audit(1712948863.571:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.585927 kernel: audit: type=1400 audit(1712948863.571:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.585974 kernel: audit: type=1400 audit(1712948863.571:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.589652 kernel: audit: type=1400 audit(1712948863.571:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.597882 kernel: audit: type=1400 audit(1712948863.571:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.597936 kernel: audit: type=1400 audit(1712948863.571:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.577000 audit: BPF prog-id=112 op=LOAD Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2023 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739613838376639613463313837666231396465326562616366663662 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2023 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739613838376639613463313837666231396465326562616366663662 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.579000 audit: BPF prog-id=113 op=LOAD Apr 12 19:07:43.579000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002132c0 items=0 ppid=2023 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739613838376639613463313837666231396465326562616366663662 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit: BPF prog-id=114 op=LOAD Apr 12 19:07:43.584000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213308 items=0 ppid=2023 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739613838376639613463313837666231396465326562616366663662 Apr 12 19:07:43.584000 audit: BPF prog-id=114 op=UNLOAD Apr 12 19:07:43.584000 audit: BPF prog-id=113 op=UNLOAD Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.584000 audit: BPF prog-id=115 op=LOAD Apr 12 19:07:43.584000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213718 items=0 ppid=2023 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739613838376639613463313837666231396465326562616366663662 Apr 12 19:07:43.608588 env[1054]: time="2024-04-12T19:07:43.608517802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9qd52,Uid:dfa55e21-fefb-49d1-806d-d369cbbfb09e,Namespace:kube-system,Attempt:0,}" Apr 12 19:07:43.625512 env[1054]: time="2024-04-12T19:07:43.625461540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-cxhqm,Uid:e9478e58-3780-4434-8435-f98d925d0506,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b\"" Apr 12 19:07:43.629597 env[1054]: time="2024-04-12T19:07:43.629564909Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 19:07:43.639511 env[1054]: time="2024-04-12T19:07:43.639425589Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:43.639688 env[1054]: time="2024-04-12T19:07:43.639665520Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:43.639830 env[1054]: time="2024-04-12T19:07:43.639772570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:43.640153 env[1054]: time="2024-04-12T19:07:43.640118780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af7b38eb9d4c33b57ff71d86b6bafc540ffc76af179e01bb8b622d1bf40d5956 pid=2062 runtime=io.containerd.runc.v2 Apr 12 19:07:43.657466 systemd[1]: Started cri-containerd-af7b38eb9d4c33b57ff71d86b6bafc540ffc76af179e01bb8b622d1bf40d5956.scope. Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.668000 audit: BPF prog-id=116 op=LOAD Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376233386562396434633333623537666637316438366236626166 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376233386562396434633333623537666637316438366236626166 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.672000 audit: BPF prog-id=117 op=LOAD Apr 12 19:07:43.672000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002961d0 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376233386562396434633333623537666637316438366236626166 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.673000 audit: BPF prog-id=118 op=LOAD Apr 12 19:07:43.673000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296218 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376233386562396434633333623537666637316438366236626166 Apr 12 19:07:43.673000 audit: BPF prog-id=118 op=UNLOAD Apr 12 19:07:43.673000 audit: BPF prog-id=117 op=UNLOAD Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.674000 audit: BPF prog-id=119 op=LOAD Apr 12 19:07:43.674000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296628 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376233386562396434633333623537666637316438366236626166 Apr 12 19:07:43.691666 env[1054]: time="2024-04-12T19:07:43.691601829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9qd52,Uid:dfa55e21-fefb-49d1-806d-d369cbbfb09e,Namespace:kube-system,Attempt:0,} returns sandbox id \"af7b38eb9d4c33b57ff71d86b6bafc540ffc76af179e01bb8b622d1bf40d5956\"" Apr 12 19:07:43.696113 env[1054]: time="2024-04-12T19:07:43.695171987Z" level=info msg="CreateContainer within sandbox \"af7b38eb9d4c33b57ff71d86b6bafc540ffc76af179e01bb8b622d1bf40d5956\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:07:43.734407 env[1054]: time="2024-04-12T19:07:43.734322549Z" level=info msg="CreateContainer within sandbox \"af7b38eb9d4c33b57ff71d86b6bafc540ffc76af179e01bb8b622d1bf40d5956\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4d672f07652ef9b4edfaafa71adfa2bbddc6ae0bb9ce07bc1562539676025e8b\"" Apr 12 19:07:43.737316 env[1054]: time="2024-04-12T19:07:43.735130414Z" level=info msg="StartContainer for \"4d672f07652ef9b4edfaafa71adfa2bbddc6ae0bb9ce07bc1562539676025e8b\"" Apr 12 19:07:43.755959 systemd[1]: Started cri-containerd-4d672f07652ef9b4edfaafa71adfa2bbddc6ae0bb9ce07bc1562539676025e8b.scope. Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0b48b2cba8 items=0 ppid=2062 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464363732663037363532656639623465646661616661373161646661 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.780000 audit: BPF prog-id=120 op=LOAD Apr 12 19:07:43.780000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000408208 items=0 ppid=2062 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464363732663037363532656639623465646661616661373161646661 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.781000 audit: BPF prog-id=121 op=LOAD Apr 12 19:07:43.781000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000408258 items=0 ppid=2062 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464363732663037363532656639623465646661616661373161646661 Apr 12 19:07:43.781000 audit: BPF prog-id=121 op=UNLOAD Apr 12 19:07:43.782000 audit: BPF prog-id=120 op=UNLOAD Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:43.782000 audit: BPF prog-id=122 op=LOAD Apr 12 19:07:43.782000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0004082e8 items=0 ppid=2062 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464363732663037363532656639623465646661616661373161646661 Apr 12 19:07:43.812163 env[1054]: time="2024-04-12T19:07:43.812083058Z" level=info msg="StartContainer for \"4d672f07652ef9b4edfaafa71adfa2bbddc6ae0bb9ce07bc1562539676025e8b\" returns successfully" Apr 12 19:07:44.266714 systemd[1]: run-containerd-runc-k8s.io-79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b-runc.PM6Urk.mount: Deactivated successfully. Apr 12 19:07:44.594000 audit[2155]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.594000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd79e65260 a2=0 a3=7ffd79e6524c items=0 ppid=2116 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:07:44.596000 audit[2156]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.596000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9eab5bc0 a2=0 a3=7fff9eab5bac items=0 ppid=2116 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:07:44.597000 audit[2158]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.597000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe148b6810 a2=0 a3=7ffe148b67fc items=0 ppid=2116 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:07:44.599000 audit[2157]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.599000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe05153680 a2=0 a3=7ffe0515366c items=0 ppid=2116 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:07:44.603000 audit[2159]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.603000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3015a410 a2=0 a3=7ffd3015a3fc items=0 ppid=2116 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:07:44.605000 audit[2160]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.605000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8d0e2620 a2=0 a3=7ffc8d0e260c items=0 ppid=2116 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:07:44.707000 audit[2161]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.707000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe8dfcee40 a2=0 a3=7ffe8dfcee2c items=0 ppid=2116 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:07:44.717000 audit[2163]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.717000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffe4d62c90 a2=0 a3=7fffe4d62c7c items=0 ppid=2116 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:07:44.728000 audit[2166]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.728000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd18edea10 a2=0 a3=7ffd18ede9fc items=0 ppid=2116 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:07:44.732000 audit[2167]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.732000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce045a230 a2=0 a3=7ffce045a21c items=0 ppid=2116 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:07:44.738000 audit[2169]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.738000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffef82c40 a2=0 a3=7ffffef82c2c items=0 ppid=2116 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:07:44.740000 audit[2170]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.740000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffad47a10 a2=0 a3=7ffffad479fc items=0 ppid=2116 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:07:44.749000 audit[2172]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.749000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd64467700 a2=0 a3=7ffd644676ec items=0 ppid=2116 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:07:44.757000 audit[2175]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.757000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce3b2b1a0 a2=0 a3=7ffce3b2b18c items=0 ppid=2116 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:07:44.760000 audit[2176]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.760000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda63b8d0 a2=0 a3=7ffcda63b8bc items=0 ppid=2116 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:07:44.766000 audit[2178]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.766000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0dd707e0 a2=0 a3=7fff0dd707cc items=0 ppid=2116 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:07:44.769000 audit[2179]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.769000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc7765710 a2=0 a3=7ffdc77656fc items=0 ppid=2116 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:07:44.774000 audit[2181]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.774000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec4e2c9c0 a2=0 a3=7ffec4e2c9ac items=0 ppid=2116 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:07:44.787000 audit[2184]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.787000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe818a9050 a2=0 a3=7ffe818a903c items=0 ppid=2116 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:07:44.798000 audit[2187]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.798000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec1fed0f0 a2=0 a3=7ffec1fed0dc items=0 ppid=2116 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:07:44.800000 audit[2188]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.800000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd329692b0 a2=0 a3=7ffd3296929c items=0 ppid=2116 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:07:44.807000 audit[2190]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.807000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc4f53870 a2=0 a3=7ffdc4f5385c items=0 ppid=2116 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:07:44.815000 audit[2193]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.815000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc523df8e0 a2=0 a3=7ffc523df8cc items=0 ppid=2116 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:07:44.828000 audit[2198]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.828000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd15afa660 a2=0 a3=7ffd15afa64c items=0 ppid=2116 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:07:44.833000 audit[2200]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:07:44.833000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd014aeb90 a2=0 a3=7ffd014aeb7c items=0 ppid=2116 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:07:44.864000 audit[2202]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:44.864000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffee7b284a0 a2=0 a3=7ffee7b2848c items=0 ppid=2116 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:44.873000 audit[2202]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:44.873000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffee7b284a0 a2=0 a3=7ffee7b2848c items=0 ppid=2116 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:44.878000 audit[2208]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.878000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeacae3ef0 a2=0 a3=7ffeacae3edc items=0 ppid=2116 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:07:44.881000 audit[2210]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.881000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe384b1b90 a2=0 a3=7ffe384b1b7c items=0 ppid=2116 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:07:44.888000 audit[2213]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.888000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6593f610 a2=0 a3=7ffd6593f5fc items=0 ppid=2116 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:07:44.890000 audit[2214]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.890000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69f76160 a2=0 a3=7ffd69f7614c items=0 ppid=2116 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:07:44.894000 audit[2216]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.894000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc944a730 a2=0 a3=7ffcc944a71c items=0 ppid=2116 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:07:44.896000 audit[2217]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.896000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3fa5ba70 a2=0 a3=7ffc3fa5ba5c items=0 ppid=2116 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:07:44.900000 audit[2219]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.900000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe2206fbb0 a2=0 a3=7ffe2206fb9c items=0 ppid=2116 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:07:44.908000 audit[2222]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.908000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe15e35ff0 a2=0 a3=7ffe15e35fdc items=0 ppid=2116 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:07:44.910000 audit[2223]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.910000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9a4a2b30 a2=0 a3=7ffc9a4a2b1c items=0 ppid=2116 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:07:44.915000 audit[2225]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.915000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd0bf8390 a2=0 a3=7fffd0bf837c items=0 ppid=2116 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:07:44.916000 audit[2226]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.916000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1cc7a600 a2=0 a3=7fff1cc7a5ec items=0 ppid=2116 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:07:44.919000 audit[2228]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.919000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff33831eb0 a2=0 a3=7fff33831e9c items=0 ppid=2116 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:07:44.923000 audit[2231]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.923000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2547db40 a2=0 a3=7fff2547db2c items=0 ppid=2116 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:07:44.926000 audit[2234]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.926000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf8e9e4b0 a2=0 a3=7ffdf8e9e49c items=0 ppid=2116 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:07:44.927000 audit[2235]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.927000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbad1d8d0 a2=0 a3=7fffbad1d8bc items=0 ppid=2116 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:07:44.929000 audit[2237]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.929000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf114f230 a2=0 a3=7ffcf114f21c items=0 ppid=2116 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:07:44.938000 audit[2240]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.938000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcddff1850 a2=0 a3=7ffcddff183c items=0 ppid=2116 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:07:44.939000 audit[2241]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.939000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd2395800 a2=0 a3=7fffd23957ec items=0 ppid=2116 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:07:44.941000 audit[2243]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.941000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9f60c0e0 a2=0 a3=7ffd9f60c0cc items=0 ppid=2116 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:07:44.944000 audit[2246]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.944000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef2a0f6d0 a2=0 a3=7ffef2a0f6bc items=0 ppid=2116 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:07:44.945000 audit[2247]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.945000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc35510710 a2=0 a3=7ffc355106fc items=0 ppid=2116 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:07:44.947000 audit[2249]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:07:44.947000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc6d6a7330 a2=0 a3=7ffc6d6a731c items=0 ppid=2116 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:07:44.950000 audit[2251]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:07:44.950000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffed76eeaf0 a2=0 a3=7ffed76eeadc items=0 ppid=2116 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.950000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:44.950000 audit[2251]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:07:44.950000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffed76eeaf0 a2=0 a3=7ffed76eeadc items=0 ppid=2116 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:44.950000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:45.487431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount920219192.mount: Deactivated successfully. Apr 12 19:07:47.336463 env[1054]: time="2024-04-12T19:07:47.336297419Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:47.345215 env[1054]: time="2024-04-12T19:07:47.345131432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:47.355402 env[1054]: time="2024-04-12T19:07:47.353183597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:47.358017 env[1054]: time="2024-04-12T19:07:47.357895377Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:47.360147 env[1054]: time="2024-04-12T19:07:47.360043497Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 19:07:47.368650 env[1054]: time="2024-04-12T19:07:47.368583367Z" level=info msg="CreateContainer within sandbox \"79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 19:07:47.403534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1493198627.mount: Deactivated successfully. Apr 12 19:07:47.417836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2980376621.mount: Deactivated successfully. Apr 12 19:07:47.425499 env[1054]: time="2024-04-12T19:07:47.425422186Z" level=info msg="CreateContainer within sandbox \"79a887f9a4c187fb19de2ebacff6bff5ae9635783759f22e3a4fa3efa189da1b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8f9109c5a98068d7e8b16f2940b4d563807c8170e74645d16fc3d18668d53333\"" Apr 12 19:07:47.430201 env[1054]: time="2024-04-12T19:07:47.429413394Z" level=info msg="StartContainer for \"8f9109c5a98068d7e8b16f2940b4d563807c8170e74645d16fc3d18668d53333\"" Apr 12 19:07:47.474075 systemd[1]: Started cri-containerd-8f9109c5a98068d7e8b16f2940b4d563807c8170e74645d16fc3d18668d53333.scope. Apr 12 19:07:47.500003 kernel: kauditd_printk_skb: 303 callbacks suppressed Apr 12 19:07:47.500328 kernel: audit: type=1400 audit(1712948867.489:1017): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.507511 kernel: audit: type=1400 audit(1712948867.489:1018): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.507577 kernel: audit: type=1400 audit(1712948867.489:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.507617 kernel: audit: type=1400 audit(1712948867.489:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.514399 kernel: audit: type=1400 audit(1712948867.489:1021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.518534 kernel: audit: type=1400 audit(1712948867.489:1022): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.528223 kernel: audit: type=1400 audit(1712948867.489:1023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.528335 kernel: audit: type=1400 audit(1712948867.489:1024): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.528372 kernel: audit: type=1400 audit(1712948867.489:1025): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.536283 kernel: audit: type=1400 audit(1712948867.490:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.490000 audit: BPF prog-id=123 op=LOAD Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2023 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:47.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393130396335613938303638643765386231366632393430623464 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2023 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:47.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393130396335613938303638643765386231366632393430623464 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.492000 audit: BPF prog-id=124 op=LOAD Apr 12 19:07:47.492000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025190 items=0 ppid=2023 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:47.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393130396335613938303638643765386231366632393430623464 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit: BPF prog-id=125 op=LOAD Apr 12 19:07:47.498000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000251d8 items=0 ppid=2023 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:47.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393130396335613938303638643765386231366632393430623464 Apr 12 19:07:47.498000 audit: BPF prog-id=125 op=UNLOAD Apr 12 19:07:47.498000 audit: BPF prog-id=124 op=UNLOAD Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:47.498000 audit: BPF prog-id=126 op=LOAD Apr 12 19:07:47.498000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000255e8 items=0 ppid=2023 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:47.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393130396335613938303638643765386231366632393430623464 Apr 12 19:07:47.543447 env[1054]: time="2024-04-12T19:07:47.543399060Z" level=info msg="StartContainer for \"8f9109c5a98068d7e8b16f2940b4d563807c8170e74645d16fc3d18668d53333\" returns successfully" Apr 12 19:07:48.314957 kubelet[1941]: I0412 19:07:48.314884 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9qd52" podStartSLOduration=6.314722046 podCreationTimestamp="2024-04-12 19:07:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:07:44.302796933 +0000 UTC m=+15.295104059" watchObservedRunningTime="2024-04-12 19:07:48.314722046 +0000 UTC m=+19.307029162" Apr 12 19:07:49.198649 kubelet[1941]: I0412 19:07:49.198610 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-cxhqm" podStartSLOduration=2.464678033 podCreationTimestamp="2024-04-12 19:07:43 +0000 UTC" firstStartedPulling="2024-04-12 19:07:43.626725942 +0000 UTC m=+14.619033029" lastFinishedPulling="2024-04-12 19:07:47.360614928 +0000 UTC m=+18.352922055" observedRunningTime="2024-04-12 19:07:48.316800365 +0000 UTC m=+19.309107491" watchObservedRunningTime="2024-04-12 19:07:49.198567059 +0000 UTC m=+20.190874136" Apr 12 19:07:50.031000 audit[2291]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:50.031000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa61490d0 a2=0 a3=7fffa61490bc items=0 ppid=2116 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:50.033000 audit[2291]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:50.033000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa61490d0 a2=0 a3=0 items=0 ppid=2116 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:50.046000 audit[2293]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:50.046000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa3899770 a2=0 a3=7fffa389975c items=0 ppid=2116 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:50.048000 audit[2293]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:50.048000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa3899770 a2=0 a3=0 items=0 ppid=2116 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:50.194749 kubelet[1941]: I0412 19:07:50.194711 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:50.200129 systemd[1]: Created slice kubepods-besteffort-pod142f96d7_20d3_4fa0_aa5d_11896c894b0d.slice. Apr 12 19:07:50.291267 kubelet[1941]: I0412 19:07:50.291125 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/142f96d7-20d3-4fa0-aa5d-11896c894b0d-typha-certs\") pod \"calico-typha-6b6f9d97bf-wqwbf\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " pod="calico-system/calico-typha-6b6f9d97bf-wqwbf" Apr 12 19:07:50.291267 kubelet[1941]: I0412 19:07:50.291180 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vj9ld\" (UniqueName: \"kubernetes.io/projected/142f96d7-20d3-4fa0-aa5d-11896c894b0d-kube-api-access-vj9ld\") pod \"calico-typha-6b6f9d97bf-wqwbf\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " pod="calico-system/calico-typha-6b6f9d97bf-wqwbf" Apr 12 19:07:50.291267 kubelet[1941]: I0412 19:07:50.291214 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/142f96d7-20d3-4fa0-aa5d-11896c894b0d-tigera-ca-bundle\") pod \"calico-typha-6b6f9d97bf-wqwbf\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " pod="calico-system/calico-typha-6b6f9d97bf-wqwbf" Apr 12 19:07:50.298673 kubelet[1941]: I0412 19:07:50.298644 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:50.304304 systemd[1]: Created slice kubepods-besteffort-pod02525be2_31f9_48dc_8ef3_7405617d7e34.slice. Apr 12 19:07:50.444193 kubelet[1941]: I0412 19:07:50.444142 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:50.444508 kubelet[1941]: E0412 19:07:50.444477 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:07:50.492779 kubelet[1941]: I0412 19:07:50.492745 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/02525be2-31f9-48dc-8ef3-7405617d7e34-node-certs\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493322 kubelet[1941]: I0412 19:07:50.493294 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-log-dir\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493571 kubelet[1941]: I0412 19:07:50.493524 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-policysync\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493630 kubelet[1941]: I0412 19:07:50.493588 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgfm7\" (UniqueName: \"kubernetes.io/projected/02525be2-31f9-48dc-8ef3-7405617d7e34-kube-api-access-vgfm7\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493630 kubelet[1941]: I0412 19:07:50.493622 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-net-dir\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493703 kubelet[1941]: I0412 19:07:50.493649 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-lib-modules\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493703 kubelet[1941]: I0412 19:07:50.493677 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-xtables-lock\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493703 kubelet[1941]: I0412 19:07:50.493703 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02525be2-31f9-48dc-8ef3-7405617d7e34-tigera-ca-bundle\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493795 kubelet[1941]: I0412 19:07:50.493731 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-bin-dir\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493795 kubelet[1941]: I0412 19:07:50.493761 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-run-calico\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493795 kubelet[1941]: I0412 19:07:50.493785 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-lib-calico\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.493890 kubelet[1941]: I0412 19:07:50.493813 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-flexvol-driver-host\") pod \"calico-node-qv4mw\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " pod="calico-system/calico-node-qv4mw" Apr 12 19:07:50.504487 env[1054]: time="2024-04-12T19:07:50.504431509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b6f9d97bf-wqwbf,Uid:142f96d7-20d3-4fa0-aa5d-11896c894b0d,Namespace:calico-system,Attempt:0,}" Apr 12 19:07:50.546776 env[1054]: time="2024-04-12T19:07:50.546554077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:50.546776 env[1054]: time="2024-04-12T19:07:50.546629618Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:50.546776 env[1054]: time="2024-04-12T19:07:50.546644727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:50.547193 env[1054]: time="2024-04-12T19:07:50.547146618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915 pid=2306 runtime=io.containerd.runc.v2 Apr 12 19:07:50.579800 systemd[1]: Started cri-containerd-0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915.scope. Apr 12 19:07:50.595693 kubelet[1941]: I0412 19:07:50.594233 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/92b0eb47-18cf-45f3-83f5-36e969973f80-kubelet-dir\") pod \"csi-node-driver-2rnpw\" (UID: \"92b0eb47-18cf-45f3-83f5-36e969973f80\") " pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:07:50.595693 kubelet[1941]: I0412 19:07:50.594314 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/92b0eb47-18cf-45f3-83f5-36e969973f80-registration-dir\") pod \"csi-node-driver-2rnpw\" (UID: \"92b0eb47-18cf-45f3-83f5-36e969973f80\") " pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:07:50.595693 kubelet[1941]: I0412 19:07:50.594363 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v5xk8\" (UniqueName: \"kubernetes.io/projected/92b0eb47-18cf-45f3-83f5-36e969973f80-kube-api-access-v5xk8\") pod \"csi-node-driver-2rnpw\" (UID: \"92b0eb47-18cf-45f3-83f5-36e969973f80\") " pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:07:50.595693 kubelet[1941]: I0412 19:07:50.594445 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/92b0eb47-18cf-45f3-83f5-36e969973f80-varrun\") pod \"csi-node-driver-2rnpw\" (UID: \"92b0eb47-18cf-45f3-83f5-36e969973f80\") " pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:07:50.595693 kubelet[1941]: I0412 19:07:50.594473 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/92b0eb47-18cf-45f3-83f5-36e969973f80-socket-dir\") pod \"csi-node-driver-2rnpw\" (UID: \"92b0eb47-18cf-45f3-83f5-36e969973f80\") " pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:07:50.595693 kubelet[1941]: E0412 19:07:50.595597 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.596046 kubelet[1941]: W0412 19:07:50.595613 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.596046 kubelet[1941]: E0412 19:07:50.595651 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.597132 kubelet[1941]: E0412 19:07:50.597110 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.597132 kubelet[1941]: W0412 19:07:50.597126 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.597252 kubelet[1941]: E0412 19:07:50.597151 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.597357 kubelet[1941]: E0412 19:07:50.597340 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.597357 kubelet[1941]: W0412 19:07:50.597357 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.597450 kubelet[1941]: E0412 19:07:50.597377 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.599321 kubelet[1941]: E0412 19:07:50.599303 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.599321 kubelet[1941]: W0412 19:07:50.599317 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.599463 kubelet[1941]: E0412 19:07:50.599447 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.602329 kubelet[1941]: E0412 19:07:50.602307 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.602329 kubelet[1941]: W0412 19:07:50.602321 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.602479 kubelet[1941]: E0412 19:07:50.602464 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.602550 kubelet[1941]: E0412 19:07:50.602474 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.602616 kubelet[1941]: W0412 19:07:50.602604 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.602722 kubelet[1941]: E0412 19:07:50.602696 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.602976 kubelet[1941]: E0412 19:07:50.602965 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.603069 kubelet[1941]: W0412 19:07:50.603057 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.603187 kubelet[1941]: E0412 19:07:50.603160 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.603425 kubelet[1941]: E0412 19:07:50.603415 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.603513 kubelet[1941]: W0412 19:07:50.603499 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.603633 kubelet[1941]: E0412 19:07:50.603601 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.603859 kubelet[1941]: E0412 19:07:50.603847 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.603932 kubelet[1941]: W0412 19:07:50.603921 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.604038 kubelet[1941]: E0412 19:07:50.604013 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.604271 kubelet[1941]: E0412 19:07:50.604260 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.604353 kubelet[1941]: W0412 19:07:50.604341 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.604423 kubelet[1941]: E0412 19:07:50.604413 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.604640 kubelet[1941]: E0412 19:07:50.604630 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.604709 kubelet[1941]: W0412 19:07:50.604699 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.604781 kubelet[1941]: E0412 19:07:50.604772 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.604966 kubelet[1941]: E0412 19:07:50.604942 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.604966 kubelet[1941]: W0412 19:07:50.604957 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.605075 kubelet[1941]: E0412 19:07:50.604979 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.605350 kubelet[1941]: E0412 19:07:50.605331 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.605350 kubelet[1941]: W0412 19:07:50.605344 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.605443 kubelet[1941]: E0412 19:07:50.605363 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.605570 kubelet[1941]: E0412 19:07:50.605522 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.605570 kubelet[1941]: W0412 19:07:50.605536 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.605570 kubelet[1941]: E0412 19:07:50.605547 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.605870 kubelet[1941]: E0412 19:07:50.605859 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.605936 kubelet[1941]: W0412 19:07:50.605926 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.606001 kubelet[1941]: E0412 19:07:50.605992 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.608889 kubelet[1941]: E0412 19:07:50.608879 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.609291 kubelet[1941]: W0412 19:07:50.609279 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.609524 kubelet[1941]: E0412 19:07:50.609514 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.609595 kubelet[1941]: W0412 19:07:50.609584 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.610717 kubelet[1941]: E0412 19:07:50.610705 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.610796 kubelet[1941]: W0412 19:07:50.610785 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.611061 kubelet[1941]: E0412 19:07:50.611050 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.611133 kubelet[1941]: W0412 19:07:50.611122 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.611203 kubelet[1941]: E0412 19:07:50.611193 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.611314 kubelet[1941]: E0412 19:07:50.611303 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.613378 kubelet[1941]: E0412 19:07:50.613367 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.613452 kubelet[1941]: W0412 19:07:50.613441 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.613520 kubelet[1941]: E0412 19:07:50.613511 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.613593 kubelet[1941]: E0412 19:07:50.613584 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.616151 kubelet[1941]: E0412 19:07:50.616119 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.617253 kubelet[1941]: E0412 19:07:50.617221 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.617340 kubelet[1941]: W0412 19:07:50.617326 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.617417 kubelet[1941]: E0412 19:07:50.617405 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.617000 audit: BPF prog-id=127 op=LOAD Apr 12 19:07:50.622000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.622000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2306 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643038333832393966346563383230616532323335363262366539 Apr 12 19:07:50.623000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.623000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2306 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643038333832393966346563383230616532323335363262366539 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.624000 audit: BPF prog-id=128 op=LOAD Apr 12 19:07:50.624000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f630 items=0 ppid=2306 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643038333832393966346563383230616532323335363262366539 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.625000 audit: BPF prog-id=129 op=LOAD Apr 12 19:07:50.625000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f678 items=0 ppid=2306 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643038333832393966346563383230616532323335363262366539 Apr 12 19:07:50.626000 audit: BPF prog-id=129 op=UNLOAD Apr 12 19:07:50.626000 audit: BPF prog-id=128 op=UNLOAD Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:50.626000 audit: BPF prog-id=130 op=LOAD Apr 12 19:07:50.626000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fa88 items=0 ppid=2306 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:50.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643038333832393966346563383230616532323335363262366539 Apr 12 19:07:50.630810 kubelet[1941]: E0412 19:07:50.630790 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.630936 kubelet[1941]: W0412 19:07:50.630920 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.631040 kubelet[1941]: E0412 19:07:50.631027 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.631328 kubelet[1941]: E0412 19:07:50.631318 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.631400 kubelet[1941]: W0412 19:07:50.631389 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.631461 kubelet[1941]: E0412 19:07:50.631453 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.631672 kubelet[1941]: E0412 19:07:50.631662 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.631744 kubelet[1941]: W0412 19:07:50.631733 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.631806 kubelet[1941]: E0412 19:07:50.631798 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.632032 kubelet[1941]: E0412 19:07:50.632022 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.632104 kubelet[1941]: W0412 19:07:50.632093 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.632231 kubelet[1941]: E0412 19:07:50.632220 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.667826 env[1054]: time="2024-04-12T19:07:50.667754858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b6f9d97bf-wqwbf,Uid:142f96d7-20d3-4fa0-aa5d-11896c894b0d,Namespace:calico-system,Attempt:0,} returns sandbox id \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\"" Apr 12 19:07:50.670122 env[1054]: time="2024-04-12T19:07:50.670097272Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 19:07:50.695055 kubelet[1941]: E0412 19:07:50.695028 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.695055 kubelet[1941]: W0412 19:07:50.695048 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.695224 kubelet[1941]: E0412 19:07:50.695072 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.695407 kubelet[1941]: E0412 19:07:50.695366 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.695407 kubelet[1941]: W0412 19:07:50.695381 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.695407 kubelet[1941]: E0412 19:07:50.695393 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.695577 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.696134 kubelet[1941]: W0412 19:07:50.695594 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.695606 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.695826 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.696134 kubelet[1941]: W0412 19:07:50.695843 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.695881 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.696028 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.696134 kubelet[1941]: W0412 19:07:50.696039 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.696134 kubelet[1941]: E0412 19:07:50.696057 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.696636 kubelet[1941]: E0412 19:07:50.696552 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.696636 kubelet[1941]: W0412 19:07:50.696562 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.696636 kubelet[1941]: E0412 19:07:50.696582 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.696843 kubelet[1941]: E0412 19:07:50.696821 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.696843 kubelet[1941]: W0412 19:07:50.696836 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.696911 kubelet[1941]: E0412 19:07:50.696854 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.697301 kubelet[1941]: E0412 19:07:50.697281 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.697301 kubelet[1941]: W0412 19:07:50.697296 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.697636 kubelet[1941]: E0412 19:07:50.697480 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.697707 kubelet[1941]: E0412 19:07:50.697662 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.697707 kubelet[1941]: W0412 19:07:50.697682 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.697828 kubelet[1941]: E0412 19:07:50.697802 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.697957 kubelet[1941]: E0412 19:07:50.697882 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.697957 kubelet[1941]: W0412 19:07:50.697896 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.698178 kubelet[1941]: E0412 19:07:50.698056 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.698276 kubelet[1941]: E0412 19:07:50.698201 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.698276 kubelet[1941]: W0412 19:07:50.698211 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.698276 kubelet[1941]: E0412 19:07:50.698257 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.698680 kubelet[1941]: E0412 19:07:50.698546 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.698680 kubelet[1941]: W0412 19:07:50.698559 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.698892 kubelet[1941]: E0412 19:07:50.698790 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.698959 kubelet[1941]: E0412 19:07:50.698919 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.698959 kubelet[1941]: W0412 19:07:50.698929 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.699179 kubelet[1941]: E0412 19:07:50.699062 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.699265 kubelet[1941]: E0412 19:07:50.699210 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.699265 kubelet[1941]: W0412 19:07:50.699220 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.699401 kubelet[1941]: E0412 19:07:50.699368 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.699467 kubelet[1941]: E0412 19:07:50.699420 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.699467 kubelet[1941]: W0412 19:07:50.699430 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.699689 kubelet[1941]: E0412 19:07:50.699576 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.699756 kubelet[1941]: E0412 19:07:50.699715 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.699756 kubelet[1941]: W0412 19:07:50.699725 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.699895 kubelet[1941]: E0412 19:07:50.699867 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.699895 kubelet[1941]: E0412 19:07:50.699883 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.699895 kubelet[1941]: W0412 19:07:50.699894 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.700033 kubelet[1941]: E0412 19:07:50.699915 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700231 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.702309 kubelet[1941]: W0412 19:07:50.700280 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700301 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700532 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.702309 kubelet[1941]: W0412 19:07:50.700540 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700565 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700685 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.702309 kubelet[1941]: W0412 19:07:50.700708 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700720 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.702309 kubelet[1941]: E0412 19:07:50.700859 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.702644 kubelet[1941]: W0412 19:07:50.700881 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.702644 kubelet[1941]: E0412 19:07:50.700893 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.702860 kubelet[1941]: E0412 19:07:50.702839 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.702860 kubelet[1941]: W0412 19:07:50.702854 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.702947 kubelet[1941]: E0412 19:07:50.702879 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.703105 kubelet[1941]: E0412 19:07:50.703050 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.703105 kubelet[1941]: W0412 19:07:50.703101 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.703336 kubelet[1941]: E0412 19:07:50.703296 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.703405 kubelet[1941]: E0412 19:07:50.703365 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.703405 kubelet[1941]: W0412 19:07:50.703376 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.703405 kubelet[1941]: E0412 19:07:50.703403 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.703644 kubelet[1941]: E0412 19:07:50.703623 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.703644 kubelet[1941]: W0412 19:07:50.703637 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.703644 kubelet[1941]: E0412 19:07:50.703649 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.714346 kubelet[1941]: E0412 19:07:50.714316 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:50.714346 kubelet[1941]: W0412 19:07:50.714340 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:50.714451 kubelet[1941]: E0412 19:07:50.714365 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:50.908758 env[1054]: time="2024-04-12T19:07:50.908669721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qv4mw,Uid:02525be2-31f9-48dc-8ef3-7405617d7e34,Namespace:calico-system,Attempt:0,}" Apr 12 19:07:50.974686 env[1054]: time="2024-04-12T19:07:50.974525360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:50.974686 env[1054]: time="2024-04-12T19:07:50.974595542Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:50.974686 env[1054]: time="2024-04-12T19:07:50.974613987Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:50.975214 env[1054]: time="2024-04-12T19:07:50.975102994Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c pid=2402 runtime=io.containerd.runc.v2 Apr 12 19:07:51.006697 systemd[1]: Started cri-containerd-f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c.scope. Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.032000 audit: BPF prog-id=131 op=LOAD Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2402 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383964303230616638623835643464306338326430666134393764 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2402 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383964303230616638623835643464306338326430666134393764 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.035000 audit: BPF prog-id=132 op=LOAD Apr 12 19:07:51.035000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002dbbd0 items=0 ppid=2402 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383964303230616638623835643464306338326430666134393764 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.037000 audit: BPF prog-id=133 op=LOAD Apr 12 19:07:51.037000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002dbc18 items=0 ppid=2402 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383964303230616638623835643464306338326430666134393764 Apr 12 19:07:51.038000 audit: BPF prog-id=133 op=UNLOAD Apr 12 19:07:51.038000 audit: BPF prog-id=132 op=UNLOAD Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:51.038000 audit: BPF prog-id=134 op=LOAD Apr 12 19:07:51.038000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ac028 items=0 ppid=2402 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633383964303230616638623835643464306338326430666134393764 Apr 12 19:07:51.059210 env[1054]: time="2024-04-12T19:07:51.059140399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qv4mw,Uid:02525be2-31f9-48dc-8ef3-7405617d7e34,Namespace:calico-system,Attempt:0,} returns sandbox id \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\"" Apr 12 19:07:51.061000 audit[2436]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:51.061000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff80f4c740 a2=0 a3=7fff80f4c72c items=0 ppid=2116 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:51.065000 audit[2436]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:51.065000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff80f4c740 a2=0 a3=0 items=0 ppid=2116 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:51.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:51.417222 systemd[1]: run-containerd-runc-k8s.io-0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915-runc.QTaJRM.mount: Deactivated successfully. Apr 12 19:07:52.094000 audit[2439]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:52.094000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffeefce0f00 a2=0 a3=7ffeefce0eec items=0 ppid=2116 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:52.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:52.095000 audit[2439]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:52.095000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeefce0f00 a2=0 a3=0 items=0 ppid=2116 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:52.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:52.178700 kubelet[1941]: E0412 19:07:52.178056 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:07:52.237405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3208288280.mount: Deactivated successfully. Apr 12 19:07:54.178156 kubelet[1941]: E0412 19:07:54.178086 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:07:55.310592 env[1054]: time="2024-04-12T19:07:55.310515474Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:55.321319 env[1054]: time="2024-04-12T19:07:55.320521754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:55.323795 env[1054]: time="2024-04-12T19:07:55.323527282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:55.327442 env[1054]: time="2024-04-12T19:07:55.327375620Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:55.331229 env[1054]: time="2024-04-12T19:07:55.331091661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 19:07:55.336307 env[1054]: time="2024-04-12T19:07:55.333504216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:07:55.363499 env[1054]: time="2024-04-12T19:07:55.363429610Z" level=info msg="CreateContainer within sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 19:07:55.379634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3578345599.mount: Deactivated successfully. Apr 12 19:07:55.388639 env[1054]: time="2024-04-12T19:07:55.388574747Z" level=info msg="CreateContainer within sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\"" Apr 12 19:07:55.389558 env[1054]: time="2024-04-12T19:07:55.389526382Z" level=info msg="StartContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\"" Apr 12 19:07:55.430376 systemd[1]: Started cri-containerd-1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a.scope. Apr 12 19:07:55.471624 kernel: kauditd_printk_skb: 185 callbacks suppressed Apr 12 19:07:55.471747 kernel: audit: type=1400 audit(1712948875.465:1079): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.471907 kernel: audit: type=1400 audit(1712948875.465:1080): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.475271 kernel: audit: type=1400 audit(1712948875.465:1081): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.482026 kernel: audit: type=1400 audit(1712948875.465:1082): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.485608 kernel: audit: type=1400 audit(1712948875.465:1083): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.489183 kernel: audit: type=1400 audit(1712948875.465:1084): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.489319 kernel: audit: type=1400 audit(1712948875.465:1085): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.495975 kernel: audit: type=1400 audit(1712948875.465:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.503692 kernel: audit: type=1400 audit(1712948875.465:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.503738 kernel: audit: type=1400 audit(1712948875.474:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit: BPF prog-id=135 op=LOAD Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2306 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:55.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163666336633037613966613538646236303732363464366566386564 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2306 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:55.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163666336633037613966613538646236303732363464366566386564 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.474000 audit: BPF prog-id=136 op=LOAD Apr 12 19:07:55.474000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e1d20 items=0 ppid=2306 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:55.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163666336633037613966613538646236303732363464366566386564 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.477000 audit: BPF prog-id=137 op=LOAD Apr 12 19:07:55.477000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e1d68 items=0 ppid=2306 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:55.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163666336633037613966613538646236303732363464366566386564 Apr 12 19:07:55.481000 audit: BPF prog-id=137 op=UNLOAD Apr 12 19:07:55.481000 audit: BPF prog-id=136 op=UNLOAD Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:55.481000 audit: BPF prog-id=138 op=LOAD Apr 12 19:07:55.481000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003aa178 items=0 ppid=2306 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:55.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163666336633037613966613538646236303732363464366566386564 Apr 12 19:07:55.563975 env[1054]: time="2024-04-12T19:07:55.563824750Z" level=info msg="StartContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" returns successfully" Apr 12 19:07:56.180225 kubelet[1941]: E0412 19:07:56.180143 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:07:56.332185 env[1054]: time="2024-04-12T19:07:56.332147419Z" level=info msg="StopContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" with timeout 300 (s)" Apr 12 19:07:56.333299 env[1054]: time="2024-04-12T19:07:56.333275304Z" level=info msg="Stop container \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" with signal terminated" Apr 12 19:07:56.357228 kubelet[1941]: I0412 19:07:56.357189 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6b6f9d97bf-wqwbf" podStartSLOduration=1.693898245 podCreationTimestamp="2024-04-12 19:07:50 +0000 UTC" firstStartedPulling="2024-04-12 19:07:50.669411255 +0000 UTC m=+21.661718331" lastFinishedPulling="2024-04-12 19:07:55.332640256 +0000 UTC m=+26.324947372" observedRunningTime="2024-04-12 19:07:56.353129255 +0000 UTC m=+27.345436361" watchObservedRunningTime="2024-04-12 19:07:56.357127286 +0000 UTC m=+27.349434362" Apr 12 19:07:56.361127 systemd[1]: cri-containerd-1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a.scope: Deactivated successfully. Apr 12 19:07:56.360000 audit: BPF prog-id=135 op=UNLOAD Apr 12 19:07:56.363000 audit: BPF prog-id=138 op=UNLOAD Apr 12 19:07:56.387137 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a-rootfs.mount: Deactivated successfully. Apr 12 19:07:56.795626 env[1054]: time="2024-04-12T19:07:56.795527967Z" level=info msg="shim disconnected" id=1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a Apr 12 19:07:56.796071 env[1054]: time="2024-04-12T19:07:56.796025640Z" level=warning msg="cleaning up after shim disconnected" id=1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a namespace=k8s.io Apr 12 19:07:56.796233 env[1054]: time="2024-04-12T19:07:56.796196891Z" level=info msg="cleaning up dead shim" Apr 12 19:07:56.817601 env[1054]: time="2024-04-12T19:07:56.817506183Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:07:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2495 runtime=io.containerd.runc.v2\n" Apr 12 19:07:56.916699 env[1054]: time="2024-04-12T19:07:56.916620779Z" level=info msg="StopContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" returns successfully" Apr 12 19:07:56.918320 env[1054]: time="2024-04-12T19:07:56.918214017Z" level=info msg="StopPodSandbox for \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\"" Apr 12 19:07:56.918688 env[1054]: time="2024-04-12T19:07:56.918635489Z" level=info msg="Container to stop \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Apr 12 19:07:56.922917 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915-shm.mount: Deactivated successfully. Apr 12 19:07:56.940712 systemd[1]: cri-containerd-0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915.scope: Deactivated successfully. Apr 12 19:07:56.939000 audit: BPF prog-id=127 op=UNLOAD Apr 12 19:07:56.944000 audit: BPF prog-id=130 op=UNLOAD Apr 12 19:07:57.000994 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915-rootfs.mount: Deactivated successfully. Apr 12 19:07:57.456786 env[1054]: time="2024-04-12T19:07:57.456679931Z" level=info msg="shim disconnected" id=0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915 Apr 12 19:07:57.456786 env[1054]: time="2024-04-12T19:07:57.456786541Z" level=warning msg="cleaning up after shim disconnected" id=0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915 namespace=k8s.io Apr 12 19:07:57.456786 env[1054]: time="2024-04-12T19:07:57.456809714Z" level=info msg="cleaning up dead shim" Apr 12 19:07:57.473530 env[1054]: time="2024-04-12T19:07:57.473420231Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:07:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2526 runtime=io.containerd.runc.v2\n" Apr 12 19:07:57.474460 env[1054]: time="2024-04-12T19:07:57.474406953Z" level=info msg="TearDown network for sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" successfully" Apr 12 19:07:57.474688 env[1054]: time="2024-04-12T19:07:57.474642394Z" level=info msg="StopPodSandbox for \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" returns successfully" Apr 12 19:07:57.522135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3272647498.mount: Deactivated successfully. Apr 12 19:07:57.546755 kubelet[1941]: I0412 19:07:57.546721 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:07:57.547368 kubelet[1941]: E0412 19:07:57.547353 1941 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="142f96d7-20d3-4fa0-aa5d-11896c894b0d" containerName="calico-typha" Apr 12 19:07:57.547490 kubelet[1941]: I0412 19:07:57.547461 1941 memory_manager.go:346] "RemoveStaleState removing state" podUID="142f96d7-20d3-4fa0-aa5d-11896c894b0d" containerName="calico-typha" Apr 12 19:07:57.554066 systemd[1]: Created slice kubepods-besteffort-pod28acd7f2_0275_4ba3_8b71_e9e3e9ec1cf7.slice. Apr 12 19:07:57.565000 audit[2539]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:57.565000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff99aef7b0 a2=0 a3=7fff99aef79c items=0 ppid=2116 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:57.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:57.566000 audit[2539]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:57.566000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff99aef7b0 a2=0 a3=0 items=0 ppid=2116 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:57.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:57.580000 audit[2541]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:57.580000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc4c401c50 a2=0 a3=7ffc4c401c3c items=0 ppid=2116 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:57.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:57.581000 audit[2541]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:07:57.581000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc4c401c50 a2=0 a3=0 items=0 ppid=2116 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:57.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:07:57.645898 kubelet[1941]: E0412 19:07:57.645850 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.645898 kubelet[1941]: W0412 19:07:57.645887 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.646086 kubelet[1941]: E0412 19:07:57.645924 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.646086 kubelet[1941]: I0412 19:07:57.645996 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vj9ld\" (UniqueName: \"kubernetes.io/projected/142f96d7-20d3-4fa0-aa5d-11896c894b0d-kube-api-access-vj9ld\") pod \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " Apr 12 19:07:57.646634 kubelet[1941]: E0412 19:07:57.646589 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.646693 kubelet[1941]: W0412 19:07:57.646648 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.646693 kubelet[1941]: E0412 19:07:57.646685 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.646756 kubelet[1941]: I0412 19:07:57.646735 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/142f96d7-20d3-4fa0-aa5d-11896c894b0d-typha-certs\") pod \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " Apr 12 19:07:57.647170 kubelet[1941]: E0412 19:07:57.647146 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.647224 kubelet[1941]: W0412 19:07:57.647173 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.647224 kubelet[1941]: E0412 19:07:57.647209 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.647319 kubelet[1941]: I0412 19:07:57.647301 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/142f96d7-20d3-4fa0-aa5d-11896c894b0d-tigera-ca-bundle\") pod \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\" (UID: \"142f96d7-20d3-4fa0-aa5d-11896c894b0d\") " Apr 12 19:07:57.648213 kubelet[1941]: E0412 19:07:57.648187 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.648295 kubelet[1941]: W0412 19:07:57.648216 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.648855 kubelet[1941]: E0412 19:07:57.648755 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.656720 kubelet[1941]: E0412 19:07:57.656687 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.656720 kubelet[1941]: W0412 19:07:57.656721 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.657183 kubelet[1941]: E0412 19:07:57.656923 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.657287 kubelet[1941]: E0412 19:07:57.657226 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.657353 kubelet[1941]: W0412 19:07:57.657291 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.657423 kubelet[1941]: E0412 19:07:57.657399 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.669018 systemd[1]: var-lib-kubelet-pods-142f96d7\x2d20d3\x2d4fa0\x2daa5d\x2d11896c894b0d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvj9ld.mount: Deactivated successfully. Apr 12 19:07:57.677702 systemd[1]: var-lib-kubelet-pods-142f96d7\x2d20d3\x2d4fa0\x2daa5d\x2d11896c894b0d-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Apr 12 19:07:57.680540 kubelet[1941]: E0412 19:07:57.680504 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.680907 kubelet[1941]: W0412 19:07:57.680543 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.680907 kubelet[1941]: E0412 19:07:57.680591 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.681063 kubelet[1941]: I0412 19:07:57.681013 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/142f96d7-20d3-4fa0-aa5d-11896c894b0d-kube-api-access-vj9ld" (OuterVolumeSpecName: "kube-api-access-vj9ld") pod "142f96d7-20d3-4fa0-aa5d-11896c894b0d" (UID: "142f96d7-20d3-4fa0-aa5d-11896c894b0d"). InnerVolumeSpecName "kube-api-access-vj9ld". PluginName "kubernetes.io/projected", VolumeGidValue "" Apr 12 19:07:57.681567 kubelet[1941]: E0412 19:07:57.681534 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.681567 kubelet[1941]: W0412 19:07:57.681563 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.682115 kubelet[1941]: E0412 19:07:57.682085 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.682159 kubelet[1941]: W0412 19:07:57.682118 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.682159 kubelet[1941]: E0412 19:07:57.682149 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.682313 kubelet[1941]: E0412 19:07:57.682287 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.682485 kubelet[1941]: W0412 19:07:57.682450 1941 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/142f96d7-20d3-4fa0-aa5d-11896c894b0d/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Apr 12 19:07:57.682971 kubelet[1941]: I0412 19:07:57.682925 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/142f96d7-20d3-4fa0-aa5d-11896c894b0d-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "142f96d7-20d3-4fa0-aa5d-11896c894b0d" (UID: "142f96d7-20d3-4fa0-aa5d-11896c894b0d"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Apr 12 19:07:57.683526 kubelet[1941]: E0412 19:07:57.683511 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.685895 kubelet[1941]: W0412 19:07:57.685876 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.685991 kubelet[1941]: E0412 19:07:57.685979 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.686512 kubelet[1941]: E0412 19:07:57.686500 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.686591 kubelet[1941]: W0412 19:07:57.686579 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.686656 kubelet[1941]: E0412 19:07:57.686647 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.687009 kubelet[1941]: E0412 19:07:57.686997 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.687808 kubelet[1941]: W0412 19:07:57.687793 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.687919 kubelet[1941]: E0412 19:07:57.687909 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.691007 kubelet[1941]: E0412 19:07:57.690988 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.691118 kubelet[1941]: W0412 19:07:57.691104 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.691209 kubelet[1941]: E0412 19:07:57.691198 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.691494 kubelet[1941]: E0412 19:07:57.691469 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.691571 kubelet[1941]: W0412 19:07:57.691560 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.691670 kubelet[1941]: E0412 19:07:57.691659 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.691891 kubelet[1941]: E0412 19:07:57.691881 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.691976 kubelet[1941]: W0412 19:07:57.691964 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.692062 kubelet[1941]: E0412 19:07:57.692052 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.692145 systemd[1]: var-lib-kubelet-pods-142f96d7\x2d20d3\x2d4fa0\x2daa5d\x2d11896c894b0d-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Apr 12 19:07:57.694554 kubelet[1941]: I0412 19:07:57.694482 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/142f96d7-20d3-4fa0-aa5d-11896c894b0d-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "142f96d7-20d3-4fa0-aa5d-11896c894b0d" (UID: "142f96d7-20d3-4fa0-aa5d-11896c894b0d"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Apr 12 19:07:57.751009 kubelet[1941]: E0412 19:07:57.748821 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.751009 kubelet[1941]: W0412 19:07:57.748862 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.751009 kubelet[1941]: E0412 19:07:57.748904 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.751009 kubelet[1941]: I0412 19:07:57.748978 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gp5dr\" (UniqueName: \"kubernetes.io/projected/28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7-kube-api-access-gp5dr\") pod \"calico-typha-bd87b9c8f-hxb7m\" (UID: \"28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7\") " pod="calico-system/calico-typha-bd87b9c8f-hxb7m" Apr 12 19:07:57.751585 kubelet[1941]: E0412 19:07:57.751543 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.751585 kubelet[1941]: W0412 19:07:57.751567 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.751678 kubelet[1941]: E0412 19:07:57.751615 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.751678 kubelet[1941]: I0412 19:07:57.751669 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7-tigera-ca-bundle\") pod \"calico-typha-bd87b9c8f-hxb7m\" (UID: \"28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7\") " pod="calico-system/calico-typha-bd87b9c8f-hxb7m" Apr 12 19:07:57.752097 kubelet[1941]: E0412 19:07:57.752066 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.752148 kubelet[1941]: W0412 19:07:57.752097 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.752148 kubelet[1941]: E0412 19:07:57.752127 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.752586 kubelet[1941]: E0412 19:07:57.752554 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.752638 kubelet[1941]: W0412 19:07:57.752609 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.752692 kubelet[1941]: E0412 19:07:57.752641 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.753162 kubelet[1941]: E0412 19:07:57.753131 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.753209 kubelet[1941]: W0412 19:07:57.753182 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.753256 kubelet[1941]: E0412 19:07:57.753215 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.753789 kubelet[1941]: E0412 19:07:57.753759 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.753834 kubelet[1941]: W0412 19:07:57.753790 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.753834 kubelet[1941]: E0412 19:07:57.753821 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.754297 kubelet[1941]: E0412 19:07:57.754272 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.754356 kubelet[1941]: W0412 19:07:57.754301 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.754356 kubelet[1941]: E0412 19:07:57.754330 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.754441 kubelet[1941]: I0412 19:07:57.754391 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7-typha-certs\") pod \"calico-typha-bd87b9c8f-hxb7m\" (UID: \"28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7\") " pod="calico-system/calico-typha-bd87b9c8f-hxb7m" Apr 12 19:07:57.754475 kubelet[1941]: I0412 19:07:57.754452 1941 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/142f96d7-20d3-4fa0-aa5d-11896c894b0d-typha-certs\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:57.754508 kubelet[1941]: I0412 19:07:57.754486 1941 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/142f96d7-20d3-4fa0-aa5d-11896c894b0d-tigera-ca-bundle\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:57.754542 kubelet[1941]: I0412 19:07:57.754521 1941 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-vj9ld\" (UniqueName: \"kubernetes.io/projected/142f96d7-20d3-4fa0-aa5d-11896c894b0d-kube-api-access-vj9ld\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:57.754958 kubelet[1941]: E0412 19:07:57.754926 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.755007 kubelet[1941]: W0412 19:07:57.754956 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.755007 kubelet[1941]: E0412 19:07:57.754985 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.755455 kubelet[1941]: E0412 19:07:57.755427 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.755517 kubelet[1941]: W0412 19:07:57.755455 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.755517 kubelet[1941]: E0412 19:07:57.755504 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.855665 kubelet[1941]: E0412 19:07:57.855613 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.855665 kubelet[1941]: W0412 19:07:57.855637 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.855665 kubelet[1941]: E0412 19:07:57.855662 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.856417 kubelet[1941]: E0412 19:07:57.856395 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.856417 kubelet[1941]: W0412 19:07:57.856409 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.856614 kubelet[1941]: E0412 19:07:57.856428 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.856926 kubelet[1941]: E0412 19:07:57.856897 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.856926 kubelet[1941]: W0412 19:07:57.856911 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.856926 kubelet[1941]: E0412 19:07:57.856929 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.857443 kubelet[1941]: E0412 19:07:57.857386 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.857443 kubelet[1941]: W0412 19:07:57.857412 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.857443 kubelet[1941]: E0412 19:07:57.857429 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.857919 kubelet[1941]: E0412 19:07:57.857888 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.857919 kubelet[1941]: W0412 19:07:57.857903 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.858110 kubelet[1941]: E0412 19:07:57.858005 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.858508 kubelet[1941]: E0412 19:07:57.858430 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.858508 kubelet[1941]: W0412 19:07:57.858489 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.858698 kubelet[1941]: E0412 19:07:57.858602 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.859023 kubelet[1941]: E0412 19:07:57.859000 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.859023 kubelet[1941]: W0412 19:07:57.859014 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.859643 kubelet[1941]: E0412 19:07:57.859122 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.859643 kubelet[1941]: E0412 19:07:57.859572 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.859643 kubelet[1941]: W0412 19:07:57.859583 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.859851 kubelet[1941]: E0412 19:07:57.859680 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.860133 kubelet[1941]: E0412 19:07:57.860107 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.860133 kubelet[1941]: W0412 19:07:57.860122 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.860870 kubelet[1941]: E0412 19:07:57.860141 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.860870 kubelet[1941]: E0412 19:07:57.860493 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.860870 kubelet[1941]: W0412 19:07:57.860504 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.860870 kubelet[1941]: E0412 19:07:57.860613 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.860870 kubelet[1941]: E0412 19:07:57.860771 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.860870 kubelet[1941]: W0412 19:07:57.860781 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.861524 kubelet[1941]: E0412 19:07:57.861340 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.861641 kubelet[1941]: E0412 19:07:57.861545 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.861641 kubelet[1941]: W0412 19:07:57.861555 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.861782 kubelet[1941]: E0412 19:07:57.861661 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.862054 kubelet[1941]: E0412 19:07:57.862028 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.862054 kubelet[1941]: W0412 19:07:57.862042 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.862054 kubelet[1941]: E0412 19:07:57.862058 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.867629 kubelet[1941]: E0412 19:07:57.867591 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.867629 kubelet[1941]: W0412 19:07:57.867609 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.868077 kubelet[1941]: E0412 19:07:57.868048 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.869188 kubelet[1941]: E0412 19:07:57.869159 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.869188 kubelet[1941]: W0412 19:07:57.869190 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.869457 kubelet[1941]: E0412 19:07:57.869212 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.869785 kubelet[1941]: E0412 19:07:57.869763 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.869785 kubelet[1941]: W0412 19:07:57.869778 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.869964 kubelet[1941]: E0412 19:07:57.869799 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.872767 kubelet[1941]: E0412 19:07:57.870208 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.872767 kubelet[1941]: W0412 19:07:57.870263 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.872767 kubelet[1941]: E0412 19:07:57.870279 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:57.892545 kubelet[1941]: E0412 19:07:57.892504 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:07:57.892545 kubelet[1941]: W0412 19:07:57.892528 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:07:57.892545 kubelet[1941]: E0412 19:07:57.892551 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:07:58.159816 env[1054]: time="2024-04-12T19:07:58.159717878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bd87b9c8f-hxb7m,Uid:28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7,Namespace:calico-system,Attempt:0,}" Apr 12 19:07:58.182777 kubelet[1941]: E0412 19:07:58.179102 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:07:58.313096 env[1054]: time="2024-04-12T19:07:58.312884097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:07:58.313096 env[1054]: time="2024-04-12T19:07:58.313016997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:07:58.313969 env[1054]: time="2024-04-12T19:07:58.313558854Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:07:58.314563 env[1054]: time="2024-04-12T19:07:58.314386427Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/529567363db33b163c1e857fbbf3df16729870c45a5172d9acb4f41c7af19e99 pid=2596 runtime=io.containerd.runc.v2 Apr 12 19:07:58.344519 kubelet[1941]: I0412 19:07:58.344111 1941 scope.go:115] "RemoveContainer" containerID="1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a" Apr 12 19:07:58.349837 systemd[1]: Removed slice kubepods-besteffort-pod142f96d7_20d3_4fa0_aa5d_11896c894b0d.slice. Apr 12 19:07:58.352833 systemd[1]: Started cri-containerd-529567363db33b163c1e857fbbf3df16729870c45a5172d9acb4f41c7af19e99.scope. Apr 12 19:07:58.362310 env[1054]: time="2024-04-12T19:07:58.362156594Z" level=info msg="RemoveContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\"" Apr 12 19:07:58.370832 env[1054]: time="2024-04-12T19:07:58.370785763Z" level=info msg="RemoveContainer for \"1cfc6c07a9fa58db607264d6ef8ed6a4c8b4db0ace7948fb95512e4e7d66778a\" returns successfully" Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.387000 audit: BPF prog-id=139 op=LOAD Apr 12 19:07:58.388000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.388000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2596 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393536373336336462333362313633633165383537666262663364 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2596 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393536373336336462333362313633633165383537666262663364 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.389000 audit: BPF prog-id=140 op=LOAD Apr 12 19:07:58.389000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002d7ce0 items=0 ppid=2596 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393536373336336462333362313633633165383537666262663364 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.391000 audit: BPF prog-id=141 op=LOAD Apr 12 19:07:58.391000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002d7d28 items=0 ppid=2596 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393536373336336462333362313633633165383537666262663364 Apr 12 19:07:58.392000 audit: BPF prog-id=141 op=UNLOAD Apr 12 19:07:58.392000 audit: BPF prog-id=140 op=UNLOAD Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.392000 audit: BPF prog-id=142 op=LOAD Apr 12 19:07:58.392000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000356138 items=0 ppid=2596 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393536373336336462333362313633633165383537666262663364 Apr 12 19:07:58.437163 env[1054]: time="2024-04-12T19:07:58.435195617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bd87b9c8f-hxb7m,Uid:28acd7f2-0275-4ba3-8b71-e9e3e9ec1cf7,Namespace:calico-system,Attempt:0,} returns sandbox id \"529567363db33b163c1e857fbbf3df16729870c45a5172d9acb4f41c7af19e99\"" Apr 12 19:07:58.448885 env[1054]: time="2024-04-12T19:07:58.448788675Z" level=info msg="CreateContainer within sandbox \"529567363db33b163c1e857fbbf3df16729870c45a5172d9acb4f41c7af19e99\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 19:07:58.471717 env[1054]: time="2024-04-12T19:07:58.471654630Z" level=info msg="CreateContainer within sandbox \"529567363db33b163c1e857fbbf3df16729870c45a5172d9acb4f41c7af19e99\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"accf99899b6720dfde01cfff35e1f18515ddde2fa1a159187207264549543c9e\"" Apr 12 19:07:58.477281 env[1054]: time="2024-04-12T19:07:58.476838191Z" level=info msg="StartContainer for \"accf99899b6720dfde01cfff35e1f18515ddde2fa1a159187207264549543c9e\"" Apr 12 19:07:58.498492 systemd[1]: Started cri-containerd-accf99899b6720dfde01cfff35e1f18515ddde2fa1a159187207264549543c9e.scope. Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.528000 audit: BPF prog-id=143 op=LOAD Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2596 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636639393839396236373230646664653031636666663335653166 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2596 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636639393839396236373230646664653031636666663335653166 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.529000 audit: BPF prog-id=144 op=LOAD Apr 12 19:07:58.529000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd10 items=0 ppid=2596 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636639393839396236373230646664653031636666663335653166 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.530000 audit: BPF prog-id=145 op=LOAD Apr 12 19:07:58.530000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd58 items=0 ppid=2596 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636639393839396236373230646664653031636666663335653166 Apr 12 19:07:58.531000 audit: BPF prog-id=145 op=UNLOAD Apr 12 19:07:58.531000 audit: BPF prog-id=144 op=UNLOAD Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.531000 audit: BPF prog-id=146 op=LOAD Apr 12 19:07:58.531000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002d6168 items=0 ppid=2596 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636639393839396236373230646664653031636666663335653166 Apr 12 19:07:58.584547 env[1054]: time="2024-04-12T19:07:58.584484722Z" level=info msg="StartContainer for \"accf99899b6720dfde01cfff35e1f18515ddde2fa1a159187207264549543c9e\" returns successfully" Apr 12 19:07:58.801976 env[1054]: time="2024-04-12T19:07:58.801747901Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:58.806145 env[1054]: time="2024-04-12T19:07:58.806084602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:58.809742 env[1054]: time="2024-04-12T19:07:58.809679330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:58.813539 env[1054]: time="2024-04-12T19:07:58.813464536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:07:58.815385 env[1054]: time="2024-04-12T19:07:58.814314301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 19:07:58.819131 env[1054]: time="2024-04-12T19:07:58.819076662Z" level=info msg="CreateContainer within sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:07:58.846618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount595641823.mount: Deactivated successfully. Apr 12 19:07:58.860340 env[1054]: time="2024-04-12T19:07:58.860201083Z" level=info msg="CreateContainer within sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\"" Apr 12 19:07:58.861799 env[1054]: time="2024-04-12T19:07:58.861729803Z" level=info msg="StartContainer for \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\"" Apr 12 19:07:58.893677 systemd[1]: Started cri-containerd-442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7.scope. Apr 12 19:07:58.914000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.914000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdd883b2b08 items=0 ppid=2402 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326161356266616438336637353730343865663938393538393532 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit: BPF prog-id=147 op=LOAD Apr 12 19:07:58.915000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003b6108 items=0 ppid=2402 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326161356266616438336637353730343865663938393538393532 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit: BPF prog-id=148 op=LOAD Apr 12 19:07:58.915000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b6158 items=0 ppid=2402 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326161356266616438336637353730343865663938393538393532 Apr 12 19:07:58.915000 audit: BPF prog-id=148 op=UNLOAD Apr 12 19:07:58.915000 audit: BPF prog-id=147 op=UNLOAD Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:07:58.915000 audit: BPF prog-id=149 op=LOAD Apr 12 19:07:58.915000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b61e8 items=0 ppid=2402 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:07:58.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326161356266616438336637353730343865663938393538393532 Apr 12 19:07:58.943382 env[1054]: time="2024-04-12T19:07:58.943328695Z" level=info msg="StartContainer for \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\" returns successfully" Apr 12 19:07:58.968647 systemd[1]: cri-containerd-442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7.scope: Deactivated successfully. Apr 12 19:07:58.971000 audit: BPF prog-id=149 op=UNLOAD Apr 12 19:07:59.186117 kubelet[1941]: I0412 19:07:59.186068 1941 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=142f96d7-20d3-4fa0-aa5d-11896c894b0d path="/var/lib/kubelet/pods/142f96d7-20d3-4fa0-aa5d-11896c894b0d/volumes" Apr 12 19:07:59.190599 env[1054]: time="2024-04-12T19:07:59.190498570Z" level=info msg="shim disconnected" id=442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7 Apr 12 19:07:59.190599 env[1054]: time="2024-04-12T19:07:59.190591205Z" level=warning msg="cleaning up after shim disconnected" id=442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7 namespace=k8s.io Apr 12 19:07:59.190885 env[1054]: time="2024-04-12T19:07:59.190617234Z" level=info msg="cleaning up dead shim" Apr 12 19:07:59.226767 env[1054]: time="2024-04-12T19:07:59.225391007Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:07:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2717 runtime=io.containerd.runc.v2\n" Apr 12 19:07:59.350250 env[1054]: time="2024-04-12T19:07:59.350060559Z" level=info msg="StopPodSandbox for \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\"" Apr 12 19:07:59.350441 env[1054]: time="2024-04-12T19:07:59.350281376Z" level=info msg="Container to stop \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Apr 12 19:07:59.358906 systemd[1]: cri-containerd-f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c.scope: Deactivated successfully. Apr 12 19:07:59.357000 audit: BPF prog-id=131 op=UNLOAD Apr 12 19:07:59.362000 audit: BPF prog-id=134 op=UNLOAD Apr 12 19:07:59.403168 kubelet[1941]: I0412 19:07:59.403131 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-bd87b9c8f-hxb7m" podStartSLOduration=8.403089258 podCreationTimestamp="2024-04-12 19:07:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:07:59.380132138 +0000 UTC m=+30.372439214" watchObservedRunningTime="2024-04-12 19:07:59.403089258 +0000 UTC m=+30.395396334" Apr 12 19:07:59.413412 env[1054]: time="2024-04-12T19:07:59.413323402Z" level=info msg="shim disconnected" id=f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c Apr 12 19:07:59.413723 env[1054]: time="2024-04-12T19:07:59.413702579Z" level=warning msg="cleaning up after shim disconnected" id=f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c namespace=k8s.io Apr 12 19:07:59.413820 env[1054]: time="2024-04-12T19:07:59.413804621Z" level=info msg="cleaning up dead shim" Apr 12 19:07:59.424084 env[1054]: time="2024-04-12T19:07:59.424032313Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:07:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2753 runtime=io.containerd.runc.v2\n" Apr 12 19:07:59.424634 env[1054]: time="2024-04-12T19:07:59.424607399Z" level=info msg="TearDown network for sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" successfully" Apr 12 19:07:59.424732 env[1054]: time="2024-04-12T19:07:59.424712818Z" level=info msg="StopPodSandbox for \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" returns successfully" Apr 12 19:07:59.506344 systemd[1]: run-containerd-runc-k8s.io-442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7-runc.tN1ijC.mount: Deactivated successfully. Apr 12 19:07:59.506545 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7-rootfs.mount: Deactivated successfully. Apr 12 19:07:59.506688 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c-rootfs.mount: Deactivated successfully. Apr 12 19:07:59.506804 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c-shm.mount: Deactivated successfully. Apr 12 19:07:59.565583 kubelet[1941]: I0412 19:07:59.565476 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-bin-dir\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565583 kubelet[1941]: I0412 19:07:59.565594 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/02525be2-31f9-48dc-8ef3-7405617d7e34-node-certs\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565650 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-lib-modules\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565711 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02525be2-31f9-48dc-8ef3-7405617d7e34-tigera-ca-bundle\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565762 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-run-calico\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565817 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-flexvol-driver-host\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565866 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-net-dir\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.565998 kubelet[1941]: I0412 19:07:59.565918 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-policysync\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.566511 kubelet[1941]: I0412 19:07:59.565971 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-log-dir\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.566511 kubelet[1941]: I0412 19:07:59.566030 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vgfm7\" (UniqueName: \"kubernetes.io/projected/02525be2-31f9-48dc-8ef3-7405617d7e34-kube-api-access-vgfm7\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.566511 kubelet[1941]: I0412 19:07:59.566082 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-xtables-lock\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.566511 kubelet[1941]: I0412 19:07:59.566136 1941 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-lib-calico\") pod \"02525be2-31f9-48dc-8ef3-7405617d7e34\" (UID: \"02525be2-31f9-48dc-8ef3-7405617d7e34\") " Apr 12 19:07:59.566511 kubelet[1941]: I0412 19:07:59.566333 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.566866 kubelet[1941]: I0412 19:07:59.566415 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.567101 kubelet[1941]: I0412 19:07:59.567036 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.567358 kubelet[1941]: I0412 19:07:59.567318 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.567925 kubelet[1941]: W0412 19:07:59.567854 1941 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/02525be2-31f9-48dc-8ef3-7405617d7e34/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Apr 12 19:07:59.568640 kubelet[1941]: I0412 19:07:59.568593 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/02525be2-31f9-48dc-8ef3-7405617d7e34-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Apr 12 19:07:59.568870 kubelet[1941]: I0412 19:07:59.568833 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.569068 kubelet[1941]: I0412 19:07:59.569030 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.569297 kubelet[1941]: I0412 19:07:59.569218 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.569507 kubelet[1941]: I0412 19:07:59.569472 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-policysync" (OuterVolumeSpecName: "policysync") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.575578 systemd[1]: var-lib-kubelet-pods-02525be2\x2d31f9\x2d48dc\x2d8ef3\x2d7405617d7e34-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Apr 12 19:07:59.578393 kubelet[1941]: I0412 19:07:59.578318 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/02525be2-31f9-48dc-8ef3-7405617d7e34-node-certs" (OuterVolumeSpecName: "node-certs") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Apr 12 19:07:59.578728 kubelet[1941]: I0412 19:07:59.578428 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 19:07:59.584844 systemd[1]: var-lib-kubelet-pods-02525be2\x2d31f9\x2d48dc\x2d8ef3\x2d7405617d7e34-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvgfm7.mount: Deactivated successfully. Apr 12 19:07:59.586418 kubelet[1941]: I0412 19:07:59.586133 1941 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/02525be2-31f9-48dc-8ef3-7405617d7e34-kube-api-access-vgfm7" (OuterVolumeSpecName: "kube-api-access-vgfm7") pod "02525be2-31f9-48dc-8ef3-7405617d7e34" (UID: "02525be2-31f9-48dc-8ef3-7405617d7e34"). InnerVolumeSpecName "kube-api-access-vgfm7". PluginName "kubernetes.io/projected", VolumeGidValue "" Apr 12 19:07:59.667645 kubelet[1941]: I0412 19:07:59.667450 1941 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-policysync\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.667882 kubelet[1941]: I0412 19:07:59.667676 1941 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-xtables-lock\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.667882 kubelet[1941]: I0412 19:07:59.667772 1941 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-lib-calico\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.667882 kubelet[1941]: I0412 19:07:59.667808 1941 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-log-dir\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.667882 kubelet[1941]: I0412 19:07:59.667842 1941 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-vgfm7\" (UniqueName: \"kubernetes.io/projected/02525be2-31f9-48dc-8ef3-7405617d7e34-kube-api-access-vgfm7\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.667882 kubelet[1941]: I0412 19:07:59.667872 1941 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-bin-dir\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.667900 1941 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/02525be2-31f9-48dc-8ef3-7405617d7e34-node-certs\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.667931 1941 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02525be2-31f9-48dc-8ef3-7405617d7e34-tigera-ca-bundle\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.667961 1941 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-var-run-calico\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.667993 1941 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-lib-modules\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.668024 1941 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-flexvol-driver-host\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:07:59.668381 kubelet[1941]: I0412 19:07:59.668056 1941 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/02525be2-31f9-48dc-8ef3-7405617d7e34-cni-net-dir\") on node \"ci-3510-3-3-5-ba19de9024.novalocal\" DevicePath \"\"" Apr 12 19:08:00.178553 kubelet[1941]: E0412 19:08:00.178450 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:00.359807 kubelet[1941]: I0412 19:08:00.359705 1941 scope.go:115] "RemoveContainer" containerID="442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7" Apr 12 19:08:00.368200 env[1054]: time="2024-04-12T19:08:00.366002908Z" level=info msg="RemoveContainer for \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\"" Apr 12 19:08:00.375752 env[1054]: time="2024-04-12T19:08:00.375684876Z" level=info msg="RemoveContainer for \"442aa5bfad83f757048ef98958952c6a520d38a7a9aa31f619174f6877392ce7\" returns successfully" Apr 12 19:08:00.379856 systemd[1]: Removed slice kubepods-besteffort-pod02525be2_31f9_48dc_8ef3_7405617d7e34.slice. Apr 12 19:08:00.466924 kubelet[1941]: I0412 19:08:00.466749 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:08:00.467797 kubelet[1941]: E0412 19:08:00.467761 1941 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="02525be2-31f9-48dc-8ef3-7405617d7e34" containerName="flexvol-driver" Apr 12 19:08:00.468080 kubelet[1941]: I0412 19:08:00.468050 1941 memory_manager.go:346] "RemoveStaleState removing state" podUID="02525be2-31f9-48dc-8ef3-7405617d7e34" containerName="flexvol-driver" Apr 12 19:08:00.479791 systemd[1]: Created slice kubepods-besteffort-pod05518b6d_0c38_4c17_a90d_8563adf3a459.slice. Apr 12 19:08:00.483360 kubelet[1941]: W0412 19:08:00.483310 1941 reflector.go:533] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-3-5-ba19de9024.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-5-ba19de9024.novalocal' and this object Apr 12 19:08:00.483645 kubelet[1941]: E0412 19:08:00.483375 1941 reflector.go:148] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-3-5-ba19de9024.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-5-ba19de9024.novalocal' and this object Apr 12 19:08:00.574870 kubelet[1941]: I0412 19:08:00.574791 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-policysync\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.575161 kubelet[1941]: I0412 19:08:00.575092 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8sc79\" (UniqueName: \"kubernetes.io/projected/05518b6d-0c38-4c17-a90d-8563adf3a459-kube-api-access-8sc79\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.575464 kubelet[1941]: I0412 19:08:00.575382 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/05518b6d-0c38-4c17-a90d-8563adf3a459-node-certs\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.575755 kubelet[1941]: I0412 19:08:00.575703 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-cni-bin-dir\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.576046 kubelet[1941]: I0412 19:08:00.575924 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-cni-log-dir\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.576222 kubelet[1941]: I0412 19:08:00.576122 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-cni-net-dir\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.576580 kubelet[1941]: I0412 19:08:00.576440 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-var-lib-calico\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.576872 kubelet[1941]: I0412 19:08:00.576730 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-flexvol-driver-host\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.577058 kubelet[1941]: I0412 19:08:00.576963 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-lib-modules\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.577175 kubelet[1941]: I0412 19:08:00.577153 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-xtables-lock\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.577477 kubelet[1941]: I0412 19:08:00.577439 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/05518b6d-0c38-4c17-a90d-8563adf3a459-tigera-ca-bundle\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.577631 kubelet[1941]: I0412 19:08:00.577604 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/05518b6d-0c38-4c17-a90d-8563adf3a459-var-run-calico\") pod \"calico-node-5c5th\" (UID: \"05518b6d-0c38-4c17-a90d-8563adf3a459\") " pod="calico-system/calico-node-5c5th" Apr 12 19:08:00.664342 kubelet[1941]: I0412 19:08:00.664206 1941 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:08:00.752000 audit[2770]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:00.754565 kernel: kauditd_printk_skb: 223 callbacks suppressed Apr 12 19:08:00.754631 kernel: audit: type=1325 audit(1712948880.752:1150): table=filter:101 family=2 entries=15 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:00.752000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc21c381d0 a2=0 a3=7ffc21c381bc items=0 ppid=2116 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:00.762978 kernel: audit: type=1300 audit(1712948880.752:1150): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc21c381d0 a2=0 a3=7ffc21c381bc items=0 ppid=2116 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:00.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:00.765875 kernel: audit: type=1327 audit(1712948880.752:1150): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:00.765948 kernel: audit: type=1325 audit(1712948880.752:1151): table=nat:102 family=2 entries=19 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:00.752000 audit[2770]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:00.752000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc21c381d0 a2=0 a3=7ffc21c381bc items=0 ppid=2116 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:00.774318 kernel: audit: type=1300 audit(1712948880.752:1151): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc21c381d0 a2=0 a3=7ffc21c381bc items=0 ppid=2116 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:00.774370 kernel: audit: type=1327 audit(1712948880.752:1151): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:00.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:01.184391 kubelet[1941]: I0412 19:08:01.184343 1941 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=02525be2-31f9-48dc-8ef3-7405617d7e34 path="/var/lib/kubelet/pods/02525be2-31f9-48dc-8ef3-7405617d7e34/volumes" Apr 12 19:08:01.680010 kubelet[1941]: E0412 19:08:01.679939 1941 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Apr 12 19:08:01.680751 kubelet[1941]: E0412 19:08:01.680125 1941 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/05518b6d-0c38-4c17-a90d-8563adf3a459-node-certs podName:05518b6d-0c38-4c17-a90d-8563adf3a459 nodeName:}" failed. No retries permitted until 2024-04-12 19:08:02.180083711 +0000 UTC m=+33.172390837 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/05518b6d-0c38-4c17-a90d-8563adf3a459-node-certs") pod "calico-node-5c5th" (UID: "05518b6d-0c38-4c17-a90d-8563adf3a459") : failed to sync secret cache: timed out waiting for the condition Apr 12 19:08:02.178939 kubelet[1941]: E0412 19:08:02.178872 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:02.287807 env[1054]: time="2024-04-12T19:08:02.287670696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5c5th,Uid:05518b6d-0c38-4c17-a90d-8563adf3a459,Namespace:calico-system,Attempt:0,}" Apr 12 19:08:02.325165 env[1054]: time="2024-04-12T19:08:02.325012680Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:08:02.325508 env[1054]: time="2024-04-12T19:08:02.325130303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:08:02.325508 env[1054]: time="2024-04-12T19:08:02.325164417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:08:02.325788 env[1054]: time="2024-04-12T19:08:02.325497094Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648 pid=2779 runtime=io.containerd.runc.v2 Apr 12 19:08:02.383970 systemd[1]: run-containerd-runc-k8s.io-2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648-runc.bNLNE2.mount: Deactivated successfully. Apr 12 19:08:02.389089 systemd[1]: Started cri-containerd-2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648.scope. Apr 12 19:08:02.407467 kernel: audit: type=1400 audit(1712948882.399:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.407607 kernel: audit: type=1400 audit(1712948882.399:1153): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.408316 kernel: audit: type=1400 audit(1712948882.399:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417602 kernel: audit: type=1400 audit(1712948882.399:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit: BPF prog-id=150 op=LOAD Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2779 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303537353033363333306665353338303261626235343934636363 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2779 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303537353033363333306665353338303261626235343934636363 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.406000 audit: BPF prog-id=151 op=LOAD Apr 12 19:08:02.406000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b0ce0 items=0 ppid=2779 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303537353033363333306665353338303261626235343934636363 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.410000 audit: BPF prog-id=152 op=LOAD Apr 12 19:08:02.410000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b0d28 items=0 ppid=2779 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303537353033363333306665353338303261626235343934636363 Apr 12 19:08:02.416000 audit: BPF prog-id=152 op=UNLOAD Apr 12 19:08:02.417000 audit: BPF prog-id=151 op=UNLOAD Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.417000 audit: BPF prog-id=153 op=LOAD Apr 12 19:08:02.417000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b1138 items=0 ppid=2779 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303537353033363333306665353338303261626235343934636363 Apr 12 19:08:02.432463 env[1054]: time="2024-04-12T19:08:02.432350571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5c5th,Uid:05518b6d-0c38-4c17-a90d-8563adf3a459,Namespace:calico-system,Attempt:0,} returns sandbox id \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\"" Apr 12 19:08:02.435609 env[1054]: time="2024-04-12T19:08:02.435575719Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:08:02.463686 env[1054]: time="2024-04-12T19:08:02.463638493Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626\"" Apr 12 19:08:02.464563 env[1054]: time="2024-04-12T19:08:02.464535778Z" level=info msg="StartContainer for \"9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626\"" Apr 12 19:08:02.482707 systemd[1]: Started cri-containerd-9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626.scope. Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8e5d512718 items=0 ppid=2779 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313165623937653037653933646336376366396365613536303466 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.502000 audit: BPF prog-id=154 op=LOAD Apr 12 19:08:02.502000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000393e38 items=0 ppid=2779 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313165623937653037653933646336376366396365613536303466 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.503000 audit: BPF prog-id=155 op=LOAD Apr 12 19:08:02.503000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000393e88 items=0 ppid=2779 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313165623937653037653933646336376366396365613536303466 Apr 12 19:08:02.504000 audit: BPF prog-id=155 op=UNLOAD Apr 12 19:08:02.504000 audit: BPF prog-id=154 op=UNLOAD Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:02.504000 audit: BPF prog-id=156 op=LOAD Apr 12 19:08:02.504000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000393f18 items=0 ppid=2779 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:02.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313165623937653037653933646336376366396365613536303466 Apr 12 19:08:02.529264 env[1054]: time="2024-04-12T19:08:02.527192628Z" level=info msg="StartContainer for \"9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626\" returns successfully" Apr 12 19:08:02.538958 systemd[1]: cri-containerd-9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626.scope: Deactivated successfully. Apr 12 19:08:02.542000 audit: BPF prog-id=156 op=UNLOAD Apr 12 19:08:02.602226 env[1054]: time="2024-04-12T19:08:02.602115998Z" level=info msg="shim disconnected" id=9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626 Apr 12 19:08:02.602509 env[1054]: time="2024-04-12T19:08:02.602488310Z" level=warning msg="cleaning up after shim disconnected" id=9011eb97e07e93dc67cf9cea5604f4a89e06dd661cbe6c6e283ea78db5273626 namespace=k8s.io Apr 12 19:08:02.602595 env[1054]: time="2024-04-12T19:08:02.602580976Z" level=info msg="cleaning up dead shim" Apr 12 19:08:02.611120 env[1054]: time="2024-04-12T19:08:02.611078278Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:08:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2859 runtime=io.containerd.runc.v2\n" Apr 12 19:08:03.398543 env[1054]: time="2024-04-12T19:08:03.398330419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:08:04.178226 kubelet[1941]: E0412 19:08:04.178182 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:05.066676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1789820262.mount: Deactivated successfully. Apr 12 19:08:06.178923 kubelet[1941]: E0412 19:08:06.178862 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:08.178039 kubelet[1941]: E0412 19:08:08.177988 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:10.178852 kubelet[1941]: E0412 19:08:10.178797 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:10.772395 env[1054]: time="2024-04-12T19:08:10.772339214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:10.776622 env[1054]: time="2024-04-12T19:08:10.776565934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:10.780885 env[1054]: time="2024-04-12T19:08:10.780806510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:10.789833 env[1054]: time="2024-04-12T19:08:10.789782035Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:10.792024 env[1054]: time="2024-04-12T19:08:10.791959671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 19:08:10.802955 env[1054]: time="2024-04-12T19:08:10.802848081Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:08:10.829970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1667230574.mount: Deactivated successfully. Apr 12 19:08:11.131564 env[1054]: time="2024-04-12T19:08:11.131410709Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191\"" Apr 12 19:08:11.132806 env[1054]: time="2024-04-12T19:08:11.132727762Z" level=info msg="StartContainer for \"7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191\"" Apr 12 19:08:11.192041 systemd[1]: Started cri-containerd-7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191.scope. Apr 12 19:08:11.227000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.228954 kernel: kauditd_printk_skb: 97 callbacks suppressed Apr 12 19:08:11.229015 kernel: audit: type=1400 audit(1712948891.227:1177): avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.227000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fad7c6e8f78 items=0 ppid=2779 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:11.240123 kernel: audit: type=1300 audit(1712948891.227:1177): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fad7c6e8f78 items=0 ppid=2779 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:11.240326 kernel: audit: type=1327 audit(1712948891.227:1177): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762633430626461663033333866663737386631343862636331363938 Apr 12 19:08:11.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762633430626461663033333866663737386631343862636331363938 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.248995 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.249091 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.255774 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.259297 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.262834 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.262886 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.272522 kernel: audit: type=1400 audit(1712948891.233:1178): avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.233000 audit: BPF prog-id=157 op=LOAD Apr 12 19:08:11.233000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003d06d8 items=0 ppid=2779 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:11.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762633430626461663033333866663737386631343862636331363938 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.245000 audit: BPF prog-id=158 op=LOAD Apr 12 19:08:11.245000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003d0728 items=0 ppid=2779 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:11.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762633430626461663033333866663737386631343862636331363938 Apr 12 19:08:11.252000 audit: BPF prog-id=158 op=UNLOAD Apr 12 19:08:11.252000 audit: BPF prog-id=157 op=UNLOAD Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:11.252000 audit: BPF prog-id=159 op=LOAD Apr 12 19:08:11.252000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003d07b8 items=0 ppid=2779 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:11.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762633430626461663033333866663737386631343862636331363938 Apr 12 19:08:11.481556 env[1054]: time="2024-04-12T19:08:11.481396211Z" level=info msg="StartContainer for \"7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191\" returns successfully" Apr 12 19:08:12.179175 kubelet[1941]: E0412 19:08:12.178491 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:13.318142 env[1054]: time="2024-04-12T19:08:13.318079114Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:08:13.320835 systemd[1]: cri-containerd-7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191.scope: Deactivated successfully. Apr 12 19:08:13.324000 audit: BPF prog-id=159 op=UNLOAD Apr 12 19:08:13.348627 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191-rootfs.mount: Deactivated successfully. Apr 12 19:08:13.363047 env[1054]: time="2024-04-12T19:08:13.362893491Z" level=info msg="shim disconnected" id=7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191 Apr 12 19:08:13.363330 env[1054]: time="2024-04-12T19:08:13.363081205Z" level=warning msg="cleaning up after shim disconnected" id=7bc40bdaf0338ff778f148bcc16981990f6a97e90e6ece016b387fa037446191 namespace=k8s.io Apr 12 19:08:13.363330 env[1054]: time="2024-04-12T19:08:13.363097656Z" level=info msg="cleaning up dead shim" Apr 12 19:08:13.371801 env[1054]: time="2024-04-12T19:08:13.371735686Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:08:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2925 runtime=io.containerd.runc.v2\n" Apr 12 19:08:13.420628 kubelet[1941]: I0412 19:08:13.420582 1941 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 19:08:13.470496 kubelet[1941]: I0412 19:08:13.470428 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:08:13.472914 kubelet[1941]: I0412 19:08:13.472869 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:08:13.476023 kubelet[1941]: I0412 19:08:13.475990 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:08:13.483919 systemd[1]: Created slice kubepods-burstable-pod5495f26f_8c56_4dab_8a63_476baf358108.slice. Apr 12 19:08:13.493861 systemd[1]: Created slice kubepods-besteffort-pod2353a27f_988f_4310_b8c4_589932e0aaf5.slice. Apr 12 19:08:13.508312 systemd[1]: Created slice kubepods-burstable-podc99e7ae6_c1f2_4d5b_9c20_44a824491590.slice. Apr 12 19:08:13.520283 env[1054]: time="2024-04-12T19:08:13.517424551Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:08:13.599482 kubelet[1941]: I0412 19:08:13.599425 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2353a27f-988f-4310-b8c4-589932e0aaf5-tigera-ca-bundle\") pod \"calico-kube-controllers-7d9f58d455-mpqwb\" (UID: \"2353a27f-988f-4310-b8c4-589932e0aaf5\") " pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" Apr 12 19:08:13.599716 kubelet[1941]: I0412 19:08:13.599566 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcmqq\" (UniqueName: \"kubernetes.io/projected/2353a27f-988f-4310-b8c4-589932e0aaf5-kube-api-access-qcmqq\") pod \"calico-kube-controllers-7d9f58d455-mpqwb\" (UID: \"2353a27f-988f-4310-b8c4-589932e0aaf5\") " pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" Apr 12 19:08:13.599716 kubelet[1941]: I0412 19:08:13.599614 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5495f26f-8c56-4dab-8a63-476baf358108-config-volume\") pod \"coredns-5d78c9869d-gxqrw\" (UID: \"5495f26f-8c56-4dab-8a63-476baf358108\") " pod="kube-system/coredns-5d78c9869d-gxqrw" Apr 12 19:08:13.599716 kubelet[1941]: I0412 19:08:13.599653 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g4pv7\" (UniqueName: \"kubernetes.io/projected/5495f26f-8c56-4dab-8a63-476baf358108-kube-api-access-g4pv7\") pod \"coredns-5d78c9869d-gxqrw\" (UID: \"5495f26f-8c56-4dab-8a63-476baf358108\") " pod="kube-system/coredns-5d78c9869d-gxqrw" Apr 12 19:08:13.599716 kubelet[1941]: I0412 19:08:13.599699 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c99e7ae6-c1f2-4d5b-9c20-44a824491590-config-volume\") pod \"coredns-5d78c9869d-smbpx\" (UID: \"c99e7ae6-c1f2-4d5b-9c20-44a824491590\") " pod="kube-system/coredns-5d78c9869d-smbpx" Apr 12 19:08:13.599853 kubelet[1941]: I0412 19:08:13.599738 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-48mzl\" (UniqueName: \"kubernetes.io/projected/c99e7ae6-c1f2-4d5b-9c20-44a824491590-kube-api-access-48mzl\") pod \"coredns-5d78c9869d-smbpx\" (UID: \"c99e7ae6-c1f2-4d5b-9c20-44a824491590\") " pod="kube-system/coredns-5d78c9869d-smbpx" Apr 12 19:08:13.792317 env[1054]: time="2024-04-12T19:08:13.792003900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gxqrw,Uid:5495f26f-8c56-4dab-8a63-476baf358108,Namespace:kube-system,Attempt:0,}" Apr 12 19:08:13.810534 env[1054]: time="2024-04-12T19:08:13.806886790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d9f58d455-mpqwb,Uid:2353a27f-988f-4310-b8c4-589932e0aaf5,Namespace:calico-system,Attempt:0,}" Apr 12 19:08:13.816325 env[1054]: time="2024-04-12T19:08:13.816272020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-smbpx,Uid:c99e7ae6-c1f2-4d5b-9c20-44a824491590,Namespace:kube-system,Attempt:0,}" Apr 12 19:08:14.003927 env[1054]: time="2024-04-12T19:08:14.003365374Z" level=error msg="Failed to destroy network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.004510 env[1054]: time="2024-04-12T19:08:14.004476257Z" level=error msg="encountered an error cleaning up failed sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.004648 env[1054]: time="2024-04-12T19:08:14.004613406Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-smbpx,Uid:c99e7ae6-c1f2-4d5b-9c20-44a824491590,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.005565 kubelet[1941]: E0412 19:08:14.004972 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.005565 kubelet[1941]: E0412 19:08:14.005043 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-smbpx" Apr 12 19:08:14.005565 kubelet[1941]: E0412 19:08:14.005085 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-smbpx" Apr 12 19:08:14.005724 kubelet[1941]: E0412 19:08:14.005165 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-smbpx_kube-system(c99e7ae6-c1f2-4d5b-9c20-44a824491590)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-smbpx_kube-system(c99e7ae6-c1f2-4d5b-9c20-44a824491590)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-smbpx" podUID=c99e7ae6-c1f2-4d5b-9c20-44a824491590 Apr 12 19:08:14.008583 env[1054]: time="2024-04-12T19:08:14.008518575Z" level=error msg="Failed to destroy network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.009020 env[1054]: time="2024-04-12T19:08:14.008975556Z" level=error msg="encountered an error cleaning up failed sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.009125 env[1054]: time="2024-04-12T19:08:14.009034538Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d9f58d455-mpqwb,Uid:2353a27f-988f-4310-b8c4-589932e0aaf5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.009697 kubelet[1941]: E0412 19:08:14.009377 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.009697 kubelet[1941]: E0412 19:08:14.009424 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" Apr 12 19:08:14.009697 kubelet[1941]: E0412 19:08:14.009449 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" Apr 12 19:08:14.009839 kubelet[1941]: E0412 19:08:14.009504 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7d9f58d455-mpqwb_calico-system(2353a27f-988f-4310-b8c4-589932e0aaf5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7d9f58d455-mpqwb_calico-system(2353a27f-988f-4310-b8c4-589932e0aaf5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" podUID=2353a27f-988f-4310-b8c4-589932e0aaf5 Apr 12 19:08:14.024537 env[1054]: time="2024-04-12T19:08:14.024478222Z" level=error msg="Failed to destroy network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.025070 env[1054]: time="2024-04-12T19:08:14.025038167Z" level=error msg="encountered an error cleaning up failed sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.025200 env[1054]: time="2024-04-12T19:08:14.025167892Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gxqrw,Uid:5495f26f-8c56-4dab-8a63-476baf358108,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.025911 kubelet[1941]: E0412 19:08:14.025516 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.025911 kubelet[1941]: E0412 19:08:14.025571 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gxqrw" Apr 12 19:08:14.025911 kubelet[1941]: E0412 19:08:14.025599 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gxqrw" Apr 12 19:08:14.026062 kubelet[1941]: E0412 19:08:14.025660 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gxqrw_kube-system(5495f26f-8c56-4dab-8a63-476baf358108)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gxqrw_kube-system(5495f26f-8c56-4dab-8a63-476baf358108)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gxqrw" podUID=5495f26f-8c56-4dab-8a63-476baf358108 Apr 12 19:08:14.190118 systemd[1]: Created slice kubepods-besteffort-pod92b0eb47_18cf_45f3_83f5_36e969973f80.slice. Apr 12 19:08:14.196312 env[1054]: time="2024-04-12T19:08:14.196181938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2rnpw,Uid:92b0eb47-18cf-45f3-83f5-36e969973f80,Namespace:calico-system,Attempt:0,}" Apr 12 19:08:14.341482 env[1054]: time="2024-04-12T19:08:14.341385303Z" level=error msg="Failed to destroy network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.342203 env[1054]: time="2024-04-12T19:08:14.342130306Z" level=error msg="encountered an error cleaning up failed sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.342347 env[1054]: time="2024-04-12T19:08:14.342280500Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2rnpw,Uid:92b0eb47-18cf-45f3-83f5-36e969973f80,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.342942 kubelet[1941]: E0412 19:08:14.342901 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.343040 kubelet[1941]: E0412 19:08:14.343014 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:08:14.343122 kubelet[1941]: E0412 19:08:14.343083 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2rnpw" Apr 12 19:08:14.343234 kubelet[1941]: E0412 19:08:14.343211 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2rnpw_calico-system(92b0eb47-18cf-45f3-83f5-36e969973f80)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2rnpw_calico-system(92b0eb47-18cf-45f3-83f5-36e969973f80)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:14.349944 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589-shm.mount: Deactivated successfully. Apr 12 19:08:14.523694 kubelet[1941]: I0412 19:08:14.520299 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:14.524422 env[1054]: time="2024-04-12T19:08:14.521311034Z" level=info msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" Apr 12 19:08:14.529310 kubelet[1941]: I0412 19:08:14.529198 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:14.531769 env[1054]: time="2024-04-12T19:08:14.530876971Z" level=info msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" Apr 12 19:08:14.544742 kubelet[1941]: I0412 19:08:14.544686 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:14.550026 env[1054]: time="2024-04-12T19:08:14.549739288Z" level=info msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" Apr 12 19:08:14.554836 kubelet[1941]: I0412 19:08:14.554782 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:14.559075 env[1054]: time="2024-04-12T19:08:14.558992316Z" level=info msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" Apr 12 19:08:14.647498 env[1054]: time="2024-04-12T19:08:14.646294973Z" level=error msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" failed" error="failed to destroy network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.647942 kubelet[1941]: E0412 19:08:14.647912 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:14.648043 kubelet[1941]: E0412 19:08:14.647968 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df} Apr 12 19:08:14.648043 kubelet[1941]: E0412 19:08:14.648015 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"92b0eb47-18cf-45f3-83f5-36e969973f80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:08:14.648151 kubelet[1941]: E0412 19:08:14.648053 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"92b0eb47-18cf-45f3-83f5-36e969973f80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2rnpw" podUID=92b0eb47-18cf-45f3-83f5-36e969973f80 Apr 12 19:08:14.665632 env[1054]: time="2024-04-12T19:08:14.665556933Z" level=error msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" failed" error="failed to destroy network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.666183 kubelet[1941]: E0412 19:08:14.666132 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:14.666183 kubelet[1941]: E0412 19:08:14.666180 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589} Apr 12 19:08:14.666359 kubelet[1941]: E0412 19:08:14.666223 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5495f26f-8c56-4dab-8a63-476baf358108\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:08:14.666359 kubelet[1941]: E0412 19:08:14.666290 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5495f26f-8c56-4dab-8a63-476baf358108\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gxqrw" podUID=5495f26f-8c56-4dab-8a63-476baf358108 Apr 12 19:08:14.667831 env[1054]: time="2024-04-12T19:08:14.667777418Z" level=error msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" failed" error="failed to destroy network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.668532 kubelet[1941]: E0412 19:08:14.668293 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:14.668532 kubelet[1941]: E0412 19:08:14.668373 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7} Apr 12 19:08:14.668532 kubelet[1941]: E0412 19:08:14.668446 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c99e7ae6-c1f2-4d5b-9c20-44a824491590\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:08:14.668532 kubelet[1941]: E0412 19:08:14.668508 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c99e7ae6-c1f2-4d5b-9c20-44a824491590\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-smbpx" podUID=c99e7ae6-c1f2-4d5b-9c20-44a824491590 Apr 12 19:08:14.671124 env[1054]: time="2024-04-12T19:08:14.671063882Z" level=error msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" failed" error="failed to destroy network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:08:14.671380 kubelet[1941]: E0412 19:08:14.671335 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:14.671380 kubelet[1941]: E0412 19:08:14.671376 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8} Apr 12 19:08:14.671487 kubelet[1941]: E0412 19:08:14.671420 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2353a27f-988f-4310-b8c4-589932e0aaf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:08:14.671487 kubelet[1941]: E0412 19:08:14.671455 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2353a27f-988f-4310-b8c4-589932e0aaf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" podUID=2353a27f-988f-4310-b8c4-589932e0aaf5 Apr 12 19:08:23.091293 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 19:08:23.095405 kernel: audit: type=1400 audit(1712948903.082:1184): avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:23.096915 kernel: audit: type=1300 audit(1712948903.082:1184): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00216da40 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:23.082000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:23.082000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00216da40 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:23.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:23.104299 kernel: audit: type=1327 audit(1712948903.082:1184): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:23.082000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:23.113275 kernel: audit: type=1400 audit(1712948903.082:1185): avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:23.082000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020e9410 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:23.122281 kernel: audit: type=1300 audit(1712948903.082:1185): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020e9410 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:23.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:23.132313 kernel: audit: type=1327 audit(1712948903.082:1185): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:23.186743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4040359241.mount: Deactivated successfully. Apr 12 19:08:23.281716 env[1054]: time="2024-04-12T19:08:23.281462326Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:23.294033 env[1054]: time="2024-04-12T19:08:23.293974353Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:23.297989 env[1054]: time="2024-04-12T19:08:23.297946932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:23.300476 env[1054]: time="2024-04-12T19:08:23.300418515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:23.300970 env[1054]: time="2024-04-12T19:08:23.300943974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 19:08:23.329847 env[1054]: time="2024-04-12T19:08:23.329768221Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:08:23.353336 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3069548658.mount: Deactivated successfully. Apr 12 19:08:23.369263 env[1054]: time="2024-04-12T19:08:23.369185972Z" level=info msg="CreateContainer within sandbox \"2d0575036330fe53802abb5494ccc4bea00225381338b2b47dede6bb6973e648\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed\"" Apr 12 19:08:23.370802 env[1054]: time="2024-04-12T19:08:23.370767890Z" level=info msg="StartContainer for \"20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed\"" Apr 12 19:08:23.391610 systemd[1]: Started cri-containerd-20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed.scope. Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fbb9896cbe8 items=0 ppid=2779 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:23.445643 kernel: audit: type=1400 audit(1712948903.435:1186): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.445717 kernel: audit: type=1300 audit(1712948903.435:1186): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fbb9896cbe8 items=0 ppid=2779 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:23.448259 kernel: audit: type=1327 audit(1712948903.435:1186): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653963633961336366666536616164343636343433366330306131 Apr 12 19:08:23.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653963633961336366666536616164343636343433366330306131 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.461254 kernel: audit: type=1400 audit(1712948903.435:1187): avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.435000 audit: BPF prog-id=160 op=LOAD Apr 12 19:08:23.435000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000349b88 items=0 ppid=2779 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:23.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653963633961336366666536616164343636343433366330306131 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit: BPF prog-id=161 op=LOAD Apr 12 19:08:23.436000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000349bd8 items=0 ppid=2779 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653963633961336366666536616164343636343433366330306131 Apr 12 19:08:23.436000 audit: BPF prog-id=161 op=UNLOAD Apr 12 19:08:23.436000 audit: BPF prog-id=160 op=UNLOAD Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:23.436000 audit: BPF prog-id=162 op=LOAD Apr 12 19:08:23.436000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000349c68 items=0 ppid=2779 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653963633961336366666536616164343636343433366330306131 Apr 12 19:08:23.477031 env[1054]: time="2024-04-12T19:08:23.476964876Z" level=info msg="StartContainer for \"20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed\" returns successfully" Apr 12 19:08:23.819668 kubelet[1941]: I0412 19:08:23.819387 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-5c5th" podStartSLOduration=3.731769372 podCreationTimestamp="2024-04-12 19:08:00 +0000 UTC" firstStartedPulling="2024-04-12 19:08:03.396840717 +0000 UTC m=+34.389147833" lastFinishedPulling="2024-04-12 19:08:23.302751938 +0000 UTC m=+54.295059014" observedRunningTime="2024-04-12 19:08:23.63666952 +0000 UTC m=+54.628976596" watchObservedRunningTime="2024-04-12 19:08:23.637680553 +0000 UTC m=+54.629987639" Apr 12 19:08:24.126759 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:08:24.126993 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 19:08:24.641488 systemd[1]: run-containerd-runc-k8s.io-20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed-runc.8emd01.mount: Deactivated successfully. Apr 12 19:08:25.181230 env[1054]: time="2024-04-12T19:08:25.181154429Z" level=info msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" Apr 12 19:08:25.441000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.441000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0097a78f0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.441000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.441000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.441000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009810630 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.441000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.442000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.442000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006dd8160 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.442000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.450000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.450000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0098106f0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.464000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.464000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006dd8560 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.464000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:25.464000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009810990 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:08:25.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:08:25.629000 audit[3317]: AVC avc: denied { write } for pid=3317 comm="tee" name="fd" dev="proc" ino=27666 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.629000 audit[3317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd86fd2961 a2=241 a3=1b6 items=1 ppid=3295 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.629000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:08:25.629000 audit: PATH item=0 name="/dev/fd/63" inode=27102 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.631000 audit[3341]: AVC avc: denied { write } for pid=3341 comm="tee" name="fd" dev="proc" ino=27120 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.631000 audit[3341]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe05e5d952 a2=241 a3=1b6 items=1 ppid=3298 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.631000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:08:25.631000 audit: PATH item=0 name="/dev/fd/63" inode=27663 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.631000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.642000 audit[3349]: AVC avc: denied { write } for pid=3349 comm="tee" name="fd" dev="proc" ino=27687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.642000 audit[3349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe5b6e961 a2=241 a3=1b6 items=1 ppid=3288 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.642000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:08:25.642000 audit: PATH item=0 name="/dev/fd/63" inode=27117 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.644000 audit[3334]: AVC avc: denied { write } for pid=3334 comm="tee" name="fd" dev="proc" ino=27691 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.644000 audit[3334]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1fac3962 a2=241 a3=1b6 items=1 ppid=3289 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.644000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:08:25.644000 audit: PATH item=0 name="/dev/fd/63" inode=27114 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.650000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=27697 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.650000 audit[3325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff050ed951 a2=241 a3=1b6 items=1 ppid=3293 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.650000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:08:25.650000 audit: PATH item=0 name="/dev/fd/63" inode=27110 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.650000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.683000 audit[3327]: AVC avc: denied { write } for pid=3327 comm="tee" name="fd" dev="proc" ino=27701 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.683000 audit[3327]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc564f961 a2=241 a3=1b6 items=1 ppid=3286 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.683000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:08:25.683000 audit: PATH item=0 name="/dev/fd/63" inode=27111 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.683000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.688000 audit[3355]: AVC avc: denied { write } for pid=3355 comm="tee" name="fd" dev="proc" ino=27705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:08:25.688000 audit[3355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec52bb963 a2=241 a3=1b6 items=1 ppid=3292 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:25.688000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:08:25.688000 audit: PATH item=0 name="/dev/fd/63" inode=27122 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:08:25.688000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.265 [INFO][3268] k8s.go 585: Cleaning up netns ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.271 [INFO][3268] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" iface="eth0" netns="/var/run/netns/cni-451f7594-57af-eb4c-4baf-ffd8f27af68b" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.271 [INFO][3268] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" iface="eth0" netns="/var/run/netns/cni-451f7594-57af-eb4c-4baf-ffd8f27af68b" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.272 [INFO][3268] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" iface="eth0" netns="/var/run/netns/cni-451f7594-57af-eb4c-4baf-ffd8f27af68b" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.272 [INFO][3268] k8s.go 592: Releasing IP address(es) ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.272 [INFO][3268] utils.go 188: Calico CNI releasing IP address ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.577 [INFO][3274] ipam_plugin.go 415: Releasing address using handleID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.580 [INFO][3274] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.581 [INFO][3274] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.772 [WARNING][3274] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.772 [INFO][3274] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.775 [INFO][3274] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:25.779729 env[1054]: 2024-04-12 19:08:25.777 [INFO][3268] k8s.go 598: Teardown processing complete. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:25.782652 systemd[1]: run-netns-cni\x2d451f7594\x2d57af\x2deb4c\x2d4baf\x2dffd8f27af68b.mount: Deactivated successfully. Apr 12 19:08:25.784077 env[1054]: time="2024-04-12T19:08:25.784018202Z" level=info msg="TearDown network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" successfully" Apr 12 19:08:25.784173 env[1054]: time="2024-04-12T19:08:25.784152845Z" level=info msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" returns successfully" Apr 12 19:08:25.785192 env[1054]: time="2024-04-12T19:08:25.785140023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-smbpx,Uid:c99e7ae6-c1f2-4d5b-9c20-44a824491590,Namespace:kube-system,Attempt:1,}" Apr 12 19:08:26.068274 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4237160f600: link becomes ready Apr 12 19:08:26.078948 systemd-networkd[970]: cali4237160f600: Link UP Apr 12 19:08:26.079205 systemd-networkd[970]: cali4237160f600: Gained carrier Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:25.896 [INFO][3365] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:25.918 [INFO][3365] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0 coredns-5d78c9869d- kube-system c99e7ae6-c1f2-4d5b-9c20-44a824491590 787 0 2024-04-12 19:07:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-5-ba19de9024.novalocal coredns-5d78c9869d-smbpx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4237160f600 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:25.918 [INFO][3365] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:25.981 [INFO][3384] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" HandleID="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.004 [INFO][3384] ipam_plugin.go 268: Auto assigning IP ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" HandleID="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291fb0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-5-ba19de9024.novalocal", "pod":"coredns-5d78c9869d-smbpx", "timestamp":"2024-04-12 19:08:25.981383099 +0000 UTC"}, Hostname:"ci-3510-3-3-5-ba19de9024.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.004 [INFO][3384] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.004 [INFO][3384] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.004 [INFO][3384] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-5-ba19de9024.novalocal' Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.009 [INFO][3384] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.018 [INFO][3384] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.024 [INFO][3384] ipam.go 489: Trying affinity for 192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.026 [INFO][3384] ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.029 [INFO][3384] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.029 [INFO][3384] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.031 [INFO][3384] ipam.go 1682: Creating new handle: k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351 Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.036 [INFO][3384] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.042 [INFO][3384] ipam.go 1216: Successfully claimed IPs: [192.168.110.1/26] block=192.168.110.0/26 handle="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.042 [INFO][3384] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.1/26] handle="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.042 [INFO][3384] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:26.092695 env[1054]: 2024-04-12 19:08:26.042 [INFO][3384] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.1/26] IPv6=[] ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" HandleID="k8s-pod-network.bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.045 [INFO][3365] k8s.go 385: Populated endpoint ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c99e7ae6-c1f2-4d5b-9c20-44a824491590", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"", Pod:"coredns-5d78c9869d-smbpx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4237160f600", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.046 [INFO][3365] k8s.go 386: Calico CNI using IPs: [192.168.110.1/32] ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.046 [INFO][3365] dataplane_linux.go 68: Setting the host side veth name to cali4237160f600 ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.065 [INFO][3365] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.065 [INFO][3365] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c99e7ae6-c1f2-4d5b-9c20-44a824491590", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351", Pod:"coredns-5d78c9869d-smbpx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4237160f600", MAC:"22:3a:74:55:c7:7b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:26.096533 env[1054]: 2024-04-12 19:08:26.088 [INFO][3365] k8s.go 498: Wrote updated endpoint to datastore ContainerID="bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351" Namespace="kube-system" Pod="coredns-5d78c9869d-smbpx" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:26.132742 env[1054]: time="2024-04-12T19:08:26.124498480Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:08:26.132742 env[1054]: time="2024-04-12T19:08:26.124564684Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:08:26.132742 env[1054]: time="2024-04-12T19:08:26.124580594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:08:26.132742 env[1054]: time="2024-04-12T19:08:26.131484208Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351 pid=3410 runtime=io.containerd.runc.v2 Apr 12 19:08:26.172402 systemd[1]: Started cri-containerd-bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351.scope. Apr 12 19:08:26.181596 env[1054]: time="2024-04-12T19:08:26.181543118Z" level=info msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" Apr 12 19:08:26.184011 env[1054]: time="2024-04-12T19:08:26.181559027Z" level=info msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.218000 audit: BPF prog-id=163 op=LOAD Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3410 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623932386661363163303435303235626364623830303039636463 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3410 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623932386661363163303435303235626364623830303039636463 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.221000 audit: BPF prog-id=164 op=LOAD Apr 12 19:08:26.221000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a70 items=0 ppid=3410 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623932386661363163303435303235626364623830303039636463 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit: BPF prog-id=165 op=LOAD Apr 12 19:08:26.222000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323ab8 items=0 ppid=3410 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623932386661363163303435303235626364623830303039636463 Apr 12 19:08:26.222000 audit: BPF prog-id=165 op=UNLOAD Apr 12 19:08:26.222000 audit: BPF prog-id=164 op=UNLOAD Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.222000 audit: BPF prog-id=166 op=LOAD Apr 12 19:08:26.222000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323ec8 items=0 ppid=3410 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623932386661363163303435303235626364623830303039636463 Apr 12 19:08:26.274042 env[1054]: time="2024-04-12T19:08:26.273983597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-smbpx,Uid:c99e7ae6-c1f2-4d5b-9c20-44a824491590,Namespace:kube-system,Attempt:1,} returns sandbox id \"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351\"" Apr 12 19:08:26.280248 env[1054]: time="2024-04-12T19:08:26.280183596Z" level=info msg="CreateContainer within sandbox \"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:08:26.350270 env[1054]: time="2024-04-12T19:08:26.350193055Z" level=info msg="CreateContainer within sandbox \"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6ca72e104d13e01476927e185670abef034d1134639a5df29aba6a1afd958715\"" Apr 12 19:08:26.352757 env[1054]: time="2024-04-12T19:08:26.351305669Z" level=info msg="StartContainer for \"6ca72e104d13e01476927e185670abef034d1134639a5df29aba6a1afd958715\"" Apr 12 19:08:26.409748 systemd[1]: Started cri-containerd-6ca72e104d13e01476927e185670abef034d1134639a5df29aba6a1afd958715.scope. Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.449000 audit: BPF prog-id=167 op=LOAD Apr 12 19:08:26.452000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.452000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3410 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663613732653130346431336530313437363932376531383536373061 Apr 12 19:08:26.454000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.454000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3410 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663613732653130346431336530313437363932376531383536373061 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.455000 audit: BPF prog-id=168 op=LOAD Apr 12 19:08:26.455000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039fdb0 items=0 ppid=3410 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663613732653130346431336530313437363932376531383536373061 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.457000 audit: BPF prog-id=169 op=LOAD Apr 12 19:08:26.457000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039fdf8 items=0 ppid=3410 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663613732653130346431336530313437363932376531383536373061 Apr 12 19:08:26.458000 audit: BPF prog-id=169 op=UNLOAD Apr 12 19:08:26.458000 audit: BPF prog-id=168 op=UNLOAD Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:26.458000 audit: BPF prog-id=170 op=LOAD Apr 12 19:08:26.458000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ec208 items=0 ppid=3410 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:26.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663613732653130346431336530313437363932376531383536373061 Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.322 [INFO][3477] k8s.go 585: Cleaning up netns ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.323 [INFO][3477] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" iface="eth0" netns="/var/run/netns/cni-4063f5ab-ae77-8e2f-ffc5-0691cd426ec8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.323 [INFO][3477] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" iface="eth0" netns="/var/run/netns/cni-4063f5ab-ae77-8e2f-ffc5-0691cd426ec8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.323 [INFO][3477] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" iface="eth0" netns="/var/run/netns/cni-4063f5ab-ae77-8e2f-ffc5-0691cd426ec8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.323 [INFO][3477] k8s.go 592: Releasing IP address(es) ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.323 [INFO][3477] utils.go 188: Calico CNI releasing IP address ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.483 [INFO][3498] ipam_plugin.go 415: Releasing address using handleID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.484 [INFO][3498] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.484 [INFO][3498] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.497 [WARNING][3498] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.498 [INFO][3498] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.500 [INFO][3498] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:26.506230 env[1054]: 2024-04-12 19:08:26.504 [INFO][3477] k8s.go 598: Teardown processing complete. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:26.507191 env[1054]: time="2024-04-12T19:08:26.506507917Z" level=info msg="StartContainer for \"6ca72e104d13e01476927e185670abef034d1134639a5df29aba6a1afd958715\" returns successfully" Apr 12 19:08:26.510228 env[1054]: time="2024-04-12T19:08:26.510165801Z" level=info msg="TearDown network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" successfully" Apr 12 19:08:26.510433 env[1054]: time="2024-04-12T19:08:26.510410021Z" level=info msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" returns successfully" Apr 12 19:08:26.513850 env[1054]: time="2024-04-12T19:08:26.513771117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d9f58d455-mpqwb,Uid:2353a27f-988f-4310-b8c4-589932e0aaf5,Namespace:calico-system,Attempt:1,}" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.328 [INFO][3476] k8s.go 585: Cleaning up netns ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.329 [INFO][3476] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" iface="eth0" netns="/var/run/netns/cni-7776d180-f9e1-d939-a182-4afe6052551a" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.329 [INFO][3476] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" iface="eth0" netns="/var/run/netns/cni-7776d180-f9e1-d939-a182-4afe6052551a" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.329 [INFO][3476] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" iface="eth0" netns="/var/run/netns/cni-7776d180-f9e1-d939-a182-4afe6052551a" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.329 [INFO][3476] k8s.go 592: Releasing IP address(es) ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.329 [INFO][3476] utils.go 188: Calico CNI releasing IP address ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.486 [INFO][3501] ipam_plugin.go 415: Releasing address using handleID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.486 [INFO][3501] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.500 [INFO][3501] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.520 [WARNING][3501] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.520 [INFO][3501] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.526 [INFO][3501] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:26.535178 env[1054]: 2024-04-12 19:08:26.532 [INFO][3476] k8s.go 598: Teardown processing complete. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:26.536710 env[1054]: time="2024-04-12T19:08:26.536672311Z" level=info msg="TearDown network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" successfully" Apr 12 19:08:26.536980 env[1054]: time="2024-04-12T19:08:26.536957528Z" level=info msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" returns successfully" Apr 12 19:08:26.538588 env[1054]: time="2024-04-12T19:08:26.538558812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2rnpw,Uid:92b0eb47-18cf-45f3-83f5-36e969973f80,Namespace:calico-system,Attempt:1,}" Apr 12 19:08:26.633316 kubelet[1941]: I0412 19:08:26.633046 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-smbpx" podStartSLOduration=43.632982834 podCreationTimestamp="2024-04-12 19:07:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:08:26.631047551 +0000 UTC m=+57.623354628" watchObservedRunningTime="2024-04-12 19:08:26.632982834 +0000 UTC m=+57.625289920" Apr 12 19:08:26.792755 systemd[1]: run-containerd-runc-k8s.io-bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351-runc.ohLDda.mount: Deactivated successfully. Apr 12 19:08:26.792846 systemd[1]: run-netns-cni\x2d7776d180\x2df9e1\x2dd939\x2da182\x2d4afe6052551a.mount: Deactivated successfully. Apr 12 19:08:26.792906 systemd[1]: run-netns-cni\x2d4063f5ab\x2dae77\x2d8e2f\x2dffc5\x2d0691cd426ec8.mount: Deactivated successfully. Apr 12 19:08:26.866346 systemd-networkd[970]: cali43971d5d0be: Link UP Apr 12 19:08:26.881535 systemd-networkd[970]: cali43971d5d0be: Gained carrier Apr 12 19:08:26.882263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43971d5d0be: link becomes ready Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.669 [INFO][3554] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0 calico-kube-controllers-7d9f58d455- calico-system 2353a27f-988f-4310-b8c4-589932e0aaf5 796 0 2024-04-12 19:07:51 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7d9f58d455 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-3-5-ba19de9024.novalocal calico-kube-controllers-7d9f58d455-mpqwb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali43971d5d0be [] []}} ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.669 [INFO][3554] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.739 [INFO][3587] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" HandleID="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.752 [INFO][3587] ipam_plugin.go 268: Auto assigning IP ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" HandleID="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f91f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-5-ba19de9024.novalocal", "pod":"calico-kube-controllers-7d9f58d455-mpqwb", "timestamp":"2024-04-12 19:08:26.739887006 +0000 UTC"}, Hostname:"ci-3510-3-3-5-ba19de9024.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.752 [INFO][3587] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.752 [INFO][3587] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.753 [INFO][3587] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-5-ba19de9024.novalocal' Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.762 [INFO][3587] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.770 [INFO][3587] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.818 [INFO][3587] ipam.go 489: Trying affinity for 192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.821 [INFO][3587] ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.829 [INFO][3587] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.829 [INFO][3587] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.832 [INFO][3587] ipam.go 1682: Creating new handle: k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7 Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.839 [INFO][3587] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.857 [INFO][3587] ipam.go 1216: Successfully claimed IPs: [192.168.110.2/26] block=192.168.110.0/26 handle="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.857 [INFO][3587] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.2/26] handle="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.857 [INFO][3587] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:26.901593 env[1054]: 2024-04-12 19:08:26.857 [INFO][3587] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.2/26] IPv6=[] ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" HandleID="k8s-pod-network.6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.860 [INFO][3554] k8s.go 385: Populated endpoint ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0", GenerateName:"calico-kube-controllers-7d9f58d455-", Namespace:"calico-system", SelfLink:"", UID:"2353a27f-988f-4310-b8c4-589932e0aaf5", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d9f58d455", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"", Pod:"calico-kube-controllers-7d9f58d455-mpqwb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43971d5d0be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.860 [INFO][3554] k8s.go 386: Calico CNI using IPs: [192.168.110.2/32] ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.860 [INFO][3554] dataplane_linux.go 68: Setting the host side veth name to cali43971d5d0be ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.882 [INFO][3554] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.882 [INFO][3554] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0", GenerateName:"calico-kube-controllers-7d9f58d455-", Namespace:"calico-system", SelfLink:"", UID:"2353a27f-988f-4310-b8c4-589932e0aaf5", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d9f58d455", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7", Pod:"calico-kube-controllers-7d9f58d455-mpqwb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43971d5d0be", MAC:"fa:ea:81:f2:57:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:26.902397 env[1054]: 2024-04-12 19:08:26.898 [INFO][3554] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7" Namespace="calico-system" Pod="calico-kube-controllers-7d9f58d455-mpqwb" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:26.933573 env[1054]: time="2024-04-12T19:08:26.933487416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:08:26.933573 env[1054]: time="2024-04-12T19:08:26.933535796Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:08:26.933817 env[1054]: time="2024-04-12T19:08:26.933572235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:08:26.933817 env[1054]: time="2024-04-12T19:08:26.933763304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7 pid=3623 runtime=io.containerd.runc.v2 Apr 12 19:08:26.973990 systemd-networkd[970]: calib873714b1b8: Link UP Apr 12 19:08:26.976293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib873714b1b8: link becomes ready Apr 12 19:08:26.975837 systemd-networkd[970]: calib873714b1b8: Gained carrier Apr 12 19:08:26.987594 systemd[1]: Started cri-containerd-6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7.scope. Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.693 [INFO][3566] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0 csi-node-driver- calico-system 92b0eb47-18cf-45f3-83f5-36e969973f80 797 0 2024-04-12 19:07:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-3-5-ba19de9024.novalocal csi-node-driver-2rnpw eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib873714b1b8 [] []}} ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.693 [INFO][3566] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.768 [INFO][3592] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" HandleID="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.818 [INFO][3592] ipam_plugin.go 268: Auto assigning IP ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" HandleID="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9d70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-5-ba19de9024.novalocal", "pod":"csi-node-driver-2rnpw", "timestamp":"2024-04-12 19:08:26.768694146 +0000 UTC"}, Hostname:"ci-3510-3-3-5-ba19de9024.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.818 [INFO][3592] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.857 [INFO][3592] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.857 [INFO][3592] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-5-ba19de9024.novalocal' Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.886 [INFO][3592] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.892 [INFO][3592] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.905 [INFO][3592] ipam.go 489: Trying affinity for 192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.908 [INFO][3592] ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.913 [INFO][3592] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.916 [INFO][3592] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.919 [INFO][3592] ipam.go 1682: Creating new handle: k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6 Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.927 [INFO][3592] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.956 [INFO][3592] ipam.go 1216: Successfully claimed IPs: [192.168.110.3/26] block=192.168.110.0/26 handle="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.956 [INFO][3592] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.3/26] handle="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.956 [INFO][3592] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:27.014146 env[1054]: 2024-04-12 19:08:26.956 [INFO][3592] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.3/26] IPv6=[] ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" HandleID="k8s-pod-network.2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:26.958 [INFO][3566] k8s.go 385: Populated endpoint ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"92b0eb47-18cf-45f3-83f5-36e969973f80", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"", Pod:"csi-node-driver-2rnpw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib873714b1b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:26.959 [INFO][3566] k8s.go 386: Calico CNI using IPs: [192.168.110.3/32] ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:26.959 [INFO][3566] dataplane_linux.go 68: Setting the host side veth name to calib873714b1b8 ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:26.974 [INFO][3566] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:26.976 [INFO][3566] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"92b0eb47-18cf-45f3-83f5-36e969973f80", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6", Pod:"csi-node-driver-2rnpw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib873714b1b8", MAC:"4a:52:20:42:98:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:27.014889 env[1054]: 2024-04-12 19:08:27.011 [INFO][3566] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6" Namespace="calico-system" Pod="csi-node-driver-2rnpw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:27.026182 systemd[1]: run-containerd-runc-k8s.io-6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7-runc.pZ0Jzo.mount: Deactivated successfully. Apr 12 19:08:27.040328 env[1054]: time="2024-04-12T19:08:27.040226861Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:08:27.040525 env[1054]: time="2024-04-12T19:08:27.040348770Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:08:27.040525 env[1054]: time="2024-04-12T19:08:27.040386572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:08:27.043950 env[1054]: time="2024-04-12T19:08:27.040625090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6 pid=3668 runtime=io.containerd.runc.v2 Apr 12 19:08:27.067000 audit[3677]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:27.067000 audit[3677]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd1ae25950 a2=0 a3=7ffd1ae2593c items=0 ppid=2116 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:27.073142 systemd[1]: Started cri-containerd-2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6.scope. Apr 12 19:08:27.077000 audit[3677]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:27.077000 audit[3677]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd1ae25950 a2=0 a3=0 items=0 ppid=2116 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.096000 audit: BPF prog-id=171 op=LOAD Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303363313139656364306562643934666364306666643431663333 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303363313139656364306562643934666364306666643431663333 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit: BPF prog-id=172 op=LOAD Apr 12 19:08:27.097000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003805e0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303363313139656364306562643934666364306666643431663333 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit: BPF prog-id=173 op=LOAD Apr 12 19:08:27.097000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000380628 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303363313139656364306562643934666364306666643431663333 Apr 12 19:08:27.097000 audit: BPF prog-id=173 op=UNLOAD Apr 12 19:08:27.097000 audit: BPF prog-id=172 op=UNLOAD Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.097000 audit: BPF prog-id=174 op=LOAD Apr 12 19:08:27.097000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000380a38 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303363313139656364306562643934666364306666643431663333 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.162000 audit: BPF prog-id=175 op=LOAD Apr 12 19:08:27.163429 env[1054]: time="2024-04-12T19:08:27.162589148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d9f58d455-mpqwb,Uid:2353a27f-988f-4310-b8c4-589932e0aaf5,Namespace:calico-system,Attempt:1,} returns sandbox id \"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7\"" Apr 12 19:08:27.165000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.165000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3668 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623432373135636133386236386263393935653136626530373234 Apr 12 19:08:27.165000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.165000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3668 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623432373135636133386236386263393935653136626530373234 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.167938 env[1054]: time="2024-04-12T19:08:27.167671042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 19:08:27.166000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.166000 audit: BPF prog-id=176 op=LOAD Apr 12 19:08:27.166000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c6010 items=0 ppid=3668 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623432373135636133386236386263393935653136626530373234 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.171000 audit: BPF prog-id=177 op=LOAD Apr 12 19:08:27.171000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c6058 items=0 ppid=3668 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623432373135636133386236386263393935653136626530373234 Apr 12 19:08:27.175000 audit: BPF prog-id=177 op=UNLOAD Apr 12 19:08:27.186630 env[1054]: time="2024-04-12T19:08:27.186576732Z" level=info msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" Apr 12 19:08:27.190000 audit: BPF prog-id=176 op=UNLOAD Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.190000 audit: BPF prog-id=178 op=LOAD Apr 12 19:08:27.190000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6468 items=0 ppid=3668 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623432373135636133386236386263393935653136626530373234 Apr 12 19:08:27.257439 env[1054]: time="2024-04-12T19:08:27.257366780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2rnpw,Uid:92b0eb47-18cf-45f3-83f5-36e969973f80,Namespace:calico-system,Attempt:1,} returns sandbox id \"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6\"" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.282 [INFO][3731] k8s.go 585: Cleaning up netns ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.282 [INFO][3731] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" iface="eth0" netns="/var/run/netns/cni-df232b42-84db-7471-a301-b1dd33d9d60a" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.282 [INFO][3731] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" iface="eth0" netns="/var/run/netns/cni-df232b42-84db-7471-a301-b1dd33d9d60a" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.283 [INFO][3731] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" iface="eth0" netns="/var/run/netns/cni-df232b42-84db-7471-a301-b1dd33d9d60a" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.283 [INFO][3731] k8s.go 592: Releasing IP address(es) ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.283 [INFO][3731] utils.go 188: Calico CNI releasing IP address ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.321 [INFO][3743] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.321 [INFO][3743] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.321 [INFO][3743] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.331 [WARNING][3743] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.331 [INFO][3743] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.334 [INFO][3743] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:27.338885 env[1054]: 2024-04-12 19:08:27.336 [INFO][3731] k8s.go 598: Teardown processing complete. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:27.339698 env[1054]: time="2024-04-12T19:08:27.338875800Z" level=info msg="TearDown network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" successfully" Apr 12 19:08:27.339698 env[1054]: time="2024-04-12T19:08:27.338925925Z" level=info msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" returns successfully" Apr 12 19:08:27.339698 env[1054]: time="2024-04-12T19:08:27.339685585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gxqrw,Uid:5495f26f-8c56-4dab-8a63-476baf358108,Namespace:kube-system,Attempt:1,}" Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.519000 audit: BPF prog-id=179 op=LOAD Apr 12 19:08:27.519000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5228acc0 a2=70 a3=7f04582c0000 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.519000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.528000 audit: BPF prog-id=179 op=UNLOAD Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.529000 audit: BPF prog-id=180 op=LOAD Apr 12 19:08:27.529000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5228acc0 a2=70 a3=6f items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.530000 audit: BPF prog-id=180 op=UNLOAD Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5228ac70 a2=70 a3=470860 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit: BPF prog-id=181 op=LOAD Apr 12 19:08:27.530000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff5228ac50 a2=70 a3=7fff5228acc0 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.530000 audit: BPF prog-id=181 op=UNLOAD Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5228ad30 a2=70 a3=0 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5228ad20 a2=70 a3=0 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.530000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.530000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5228ac90 a2=70 a3=0 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.533000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.533000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff5228ad60 a2=70 a3=fe00 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.534000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.534000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5228ad60 a2=70 a3=fe00 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.535000 audit: BPF prog-id=182 op=LOAD Apr 12 19:08:27.535000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5228ac80 a2=70 a3=0 items=0 ppid=3299 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:08:27.566000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.566000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc6a21d90 a2=70 a3=ffff items=0 ppid=3299 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:08:27.567000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.567000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc6a21c60 a2=70 a3=3 items=0 ppid=3299 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:08:27.576000 audit: BPF prog-id=182 op=UNLOAD Apr 12 19:08:27.621568 systemd-networkd[970]: vxlan.calico: Link UP Apr 12 19:08:27.621577 systemd-networkd[970]: vxlan.calico: Gained carrier Apr 12 19:08:27.652422 systemd-networkd[970]: calia1cdf26f40b: Link UP Apr 12 19:08:27.654714 systemd-networkd[970]: calia1cdf26f40b: Gained carrier Apr 12 19:08:27.655371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia1cdf26f40b: link becomes ready Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.454 [INFO][3752] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0 coredns-5d78c9869d- kube-system 5495f26f-8c56-4dab-8a63-476baf358108 816 0 2024-04-12 19:07:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-5-ba19de9024.novalocal coredns-5d78c9869d-gxqrw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia1cdf26f40b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.454 [INFO][3752] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.528 [INFO][3773] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" HandleID="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.563 [INFO][3773] ipam_plugin.go 268: Auto assigning IP ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" HandleID="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9fc0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-5-ba19de9024.novalocal", "pod":"coredns-5d78c9869d-gxqrw", "timestamp":"2024-04-12 19:08:27.528288347 +0000 UTC"}, Hostname:"ci-3510-3-3-5-ba19de9024.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.563 [INFO][3773] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.563 [INFO][3773] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.564 [INFO][3773] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-5-ba19de9024.novalocal' Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.568 [INFO][3773] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.574 [INFO][3773] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.589 [INFO][3773] ipam.go 489: Trying affinity for 192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.595 [INFO][3773] ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.598 [INFO][3773] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.598 [INFO][3773] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.600 [INFO][3773] ipam.go 1682: Creating new handle: k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873 Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.614 [INFO][3773] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.645 [INFO][3773] ipam.go 1216: Successfully claimed IPs: [192.168.110.4/26] block=192.168.110.0/26 handle="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.645 [INFO][3773] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.4/26] handle="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.645 [INFO][3773] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:27.683062 env[1054]: 2024-04-12 19:08:27.645 [INFO][3773] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.4/26] IPv6=[] ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" HandleID="k8s-pod-network.579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.649 [INFO][3752] k8s.go 385: Populated endpoint ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5495f26f-8c56-4dab-8a63-476baf358108", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"", Pod:"coredns-5d78c9869d-gxqrw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia1cdf26f40b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.649 [INFO][3752] k8s.go 386: Calico CNI using IPs: [192.168.110.4/32] ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.649 [INFO][3752] dataplane_linux.go 68: Setting the host side veth name to calia1cdf26f40b ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.655 [INFO][3752] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.657 [INFO][3752] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5495f26f-8c56-4dab-8a63-476baf358108", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873", Pod:"coredns-5d78c9869d-gxqrw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia1cdf26f40b", MAC:"16:66:6e:a8:e1:2f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:27.684532 env[1054]: 2024-04-12 19:08:27.680 [INFO][3752] k8s.go 498: Wrote updated endpoint to datastore ContainerID="579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873" Namespace="kube-system" Pod="coredns-5d78c9869d-gxqrw" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:27.711524 env[1054]: time="2024-04-12T19:08:27.711428709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:08:27.711756 env[1054]: time="2024-04-12T19:08:27.711525080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:08:27.711756 env[1054]: time="2024-04-12T19:08:27.711559866Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:08:27.712965 env[1054]: time="2024-04-12T19:08:27.711776364Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873 pid=3820 runtime=io.containerd.runc.v2 Apr 12 19:08:27.717000 audit[3825]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:27.717000 audit[3825]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd86040490 a2=0 a3=7ffd8604047c items=0 ppid=2116 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:27.722000 audit[3825]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:27.722000 audit[3825]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd86040490 a2=0 a3=7ffd8604047c items=0 ppid=2116 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:27.738669 systemd[1]: Started cri-containerd-579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873.scope. Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.787000 audit: BPF prog-id=183 op=LOAD Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3820 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396363663537346466613135313035623262616633336431663461 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3820 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396363663537346466613135313035623262616633336431663461 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.790000 audit: BPF prog-id=184 op=LOAD Apr 12 19:08:27.790000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034dce0 items=0 ppid=3820 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396363663537346466613135313035623262616633336431663461 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.791000 audit: BPF prog-id=185 op=LOAD Apr 12 19:08:27.791000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034dd28 items=0 ppid=3820 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396363663537346466613135313035623262616633336431663461 Apr 12 19:08:27.793000 audit: BPF prog-id=185 op=UNLOAD Apr 12 19:08:27.793000 audit: BPF prog-id=184 op=UNLOAD Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.793000 audit: BPF prog-id=186 op=LOAD Apr 12 19:08:27.793000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce138 items=0 ppid=3820 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396363663537346466613135313035623262616633336431663461 Apr 12 19:08:27.798837 systemd[1]: run-netns-cni\x2ddf232b42\x2d84db\x2d7471\x2da301\x2db1dd33d9d60a.mount: Deactivated successfully. Apr 12 19:08:27.840604 systemd-networkd[970]: cali4237160f600: Gained IPv6LL Apr 12 19:08:27.863507 env[1054]: time="2024-04-12T19:08:27.860540850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gxqrw,Uid:5495f26f-8c56-4dab-8a63-476baf358108,Namespace:kube-system,Attempt:1,} returns sandbox id \"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873\"" Apr 12 19:08:27.870213 env[1054]: time="2024-04-12T19:08:27.870161907Z" level=info msg="CreateContainer within sandbox \"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:08:27.899199 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1573767524.mount: Deactivated successfully. Apr 12 19:08:27.905939 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4006115814.mount: Deactivated successfully. Apr 12 19:08:27.919523 env[1054]: time="2024-04-12T19:08:27.919446430Z" level=info msg="CreateContainer within sandbox \"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"35706c7533a81f25c560be6bdda2d000327c31c32373c797526d8099becc3b6e\"" Apr 12 19:08:27.920616 env[1054]: time="2024-04-12T19:08:27.920577940Z" level=info msg="StartContainer for \"35706c7533a81f25c560be6bdda2d000327c31c32373c797526d8099becc3b6e\"" Apr 12 19:08:27.945647 systemd[1]: Started cri-containerd-35706c7533a81f25c560be6bdda2d000327c31c32373c797526d8099becc3b6e.scope. Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.967000 audit: BPF prog-id=187 op=LOAD Apr 12 19:08:27.968000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.968000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3820 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373036633735333361383166323563353630626536626464613264 Apr 12 19:08:27.968000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.968000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3820 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373036633735333361383166323563353630626536626464613264 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.969000 audit: BPF prog-id=188 op=LOAD Apr 12 19:08:27.969000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001912c0 items=0 ppid=3820 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373036633735333361383166323563353630626536626464613264 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.970000 audit: BPF prog-id=189 op=LOAD Apr 12 19:08:27.970000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000191308 items=0 ppid=3820 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373036633735333361383166323563353630626536626464613264 Apr 12 19:08:27.971000 audit: BPF prog-id=189 op=UNLOAD Apr 12 19:08:27.972000 audit: BPF prog-id=188 op=UNLOAD Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:27.972000 audit: BPF prog-id=190 op=LOAD Apr 12 19:08:27.972000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000191718 items=0 ppid=3820 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:27.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373036633735333361383166323563353630626536626464613264 Apr 12 19:08:27.999011 env[1054]: time="2024-04-12T19:08:27.998954325Z" level=info msg="StartContainer for \"35706c7533a81f25c560be6bdda2d000327c31c32373c797526d8099becc3b6e\" returns successfully" Apr 12 19:08:28.017000 audit[3902]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.017000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcb095ea40 a2=0 a3=7ffcb095ea2c items=0 ppid=3299 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.017000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.034000 audit[3900]: NETFILTER_CFG table=raw:108 family=2 entries=19 op=nft_register_chain pid=3900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.034000 audit[3900]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffcb5717a50 a2=0 a3=7ffcb5717a3c items=0 ppid=3299 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.036000 audit[3903]: NETFILTER_CFG table=mangle:109 family=2 entries=16 op=nft_register_chain pid=3903 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.036000 audit[3903]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe1ac2c240 a2=0 a3=7ffe1ac2c22c items=0 ppid=3299 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.036000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.053000 audit[3909]: NETFILTER_CFG table=filter:110 family=2 entries=135 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.053000 audit[3909]: SYSCALL arch=c000003e syscall=46 success=yes exit=74944 a0=3 a1=7fff1fecbe00 a2=0 a3=7fff1fecbdec items=0 ppid=3299 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.087684 kernel: kauditd_printk_skb: 535 callbacks suppressed Apr 12 19:08:28.087936 kernel: audit: type=1325 audit(1712948908.083:1337): table=filter:111 family=2 entries=34 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.083000 audit[3916]: NETFILTER_CFG table=filter:111 family=2 entries=34 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:08:28.083000 audit[3916]: SYSCALL arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7ffd78125470 a2=0 a3=7ffd7812545c items=0 ppid=3299 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.093693 kernel: audit: type=1300 audit(1712948908.083:1337): arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7ffd78125470 a2=0 a3=7ffd7812545c items=0 ppid=3299 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.093770 kernel: audit: type=1327 audit(1712948908.083:1337): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.083000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:08:28.223860 systemd-networkd[970]: cali43971d5d0be: Gained IPv6LL Apr 12 19:08:28.671765 systemd-networkd[970]: vxlan.calico: Gained IPv6LL Apr 12 19:08:28.678702 kubelet[1941]: I0412 19:08:28.678637 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gxqrw" podStartSLOduration=45.678481717 podCreationTimestamp="2024-04-12 19:07:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:08:28.662995093 +0000 UTC m=+59.655302219" watchObservedRunningTime="2024-04-12 19:08:28.678481717 +0000 UTC m=+59.670788833" Apr 12 19:08:28.751000 audit[3920]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=3920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:28.751000 audit[3920]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff676bb2c0 a2=0 a3=7fff676bb2ac items=0 ppid=2116 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.762356 kernel: audit: type=1325 audit(1712948908.751:1338): table=filter:112 family=2 entries=8 op=nft_register_rule pid=3920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:28.762459 kernel: audit: type=1300 audit(1712948908.751:1338): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff676bb2c0 a2=0 a3=7fff676bb2ac items=0 ppid=2116 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:28.765681 kernel: audit: type=1327 audit(1712948908.751:1338): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:28.777000 audit[3920]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=3920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:28.783403 kernel: audit: type=1325 audit(1712948908.777:1339): table=nat:113 family=2 entries=56 op=nft_register_chain pid=3920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:28.777000 audit[3920]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff676bb2c0 a2=0 a3=7fff676bb2ac items=0 ppid=2116 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.793334 kernel: audit: type=1300 audit(1712948908.777:1339): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff676bb2c0 a2=0 a3=7fff676bb2ac items=0 ppid=2116 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:28.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:28.801297 kernel: audit: type=1327 audit(1712948908.777:1339): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:28.927599 systemd-networkd[970]: calia1cdf26f40b: Gained IPv6LL Apr 12 19:08:28.940000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:28.945325 kernel: audit: type=1400 audit(1712948908.940:1340): avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:28.940000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bdbe00 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:28.940000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:28.953000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:28.953000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99ce0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:28.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:28.966000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:28.966000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99d00 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:28.966000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:28.974000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:08:28.974000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bdbfc0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:08:28.974000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:08:28.991518 systemd-networkd[970]: calib873714b1b8: Gained IPv6LL Apr 12 19:08:29.822000 audit[3931]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:29.822000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4ff3faf0 a2=0 a3=7ffe4ff3fadc items=0 ppid=2116 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:29.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:29.823000 audit[3931]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:08:29.823000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4ff3faf0 a2=0 a3=7ffe4ff3fadc items=0 ppid=2116 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:29.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:08:29.897050 env[1054]: time="2024-04-12T19:08:29.870462669Z" level=info msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" Apr 12 19:08:30.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.96:22-172.24.4.1:58188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:30.089517 systemd[1]: Started sshd@7-172.24.4.96:22-172.24.4.1:58188.service. Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.053 [WARNING][3947] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"92b0eb47-18cf-45f3-83f5-36e969973f80", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6", Pod:"csi-node-driver-2rnpw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib873714b1b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.054 [INFO][3947] k8s.go 585: Cleaning up netns ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.054 [INFO][3947] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" iface="eth0" netns="" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.141 [INFO][3947] k8s.go 592: Releasing IP address(es) ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.141 [INFO][3947] utils.go 188: Calico CNI releasing IP address ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.169 [INFO][3955] ipam_plugin.go 415: Releasing address using handleID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.169 [INFO][3955] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.171 [INFO][3955] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.192 [WARNING][3955] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.194 [INFO][3955] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.196 [INFO][3955] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:30.207324 env[1054]: 2024-04-12 19:08:30.200 [INFO][3947] k8s.go 598: Teardown processing complete. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.207324 env[1054]: time="2024-04-12T19:08:30.206997266Z" level=info msg="TearDown network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" successfully" Apr 12 19:08:30.207324 env[1054]: time="2024-04-12T19:08:30.207043745Z" level=info msg="StopPodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" returns successfully" Apr 12 19:08:30.214094 env[1054]: time="2024-04-12T19:08:30.214061158Z" level=info msg="RemovePodSandbox for \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" Apr 12 19:08:30.214311 env[1054]: time="2024-04-12T19:08:30.214233792Z" level=info msg="Forcibly stopping sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\"" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.391 [WARNING][3973] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"92b0eb47-18cf-45f3-83f5-36e969973f80", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6", Pod:"csi-node-driver-2rnpw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib873714b1b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.392 [INFO][3973] k8s.go 585: Cleaning up netns ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.392 [INFO][3973] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" iface="eth0" netns="" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.401 [INFO][3973] k8s.go 592: Releasing IP address(es) ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.401 [INFO][3973] utils.go 188: Calico CNI releasing IP address ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.474 [INFO][3980] ipam_plugin.go 415: Releasing address using handleID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.475 [INFO][3980] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.475 [INFO][3980] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.483 [WARNING][3980] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.483 [INFO][3980] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" HandleID="k8s-pod-network.9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-csi--node--driver--2rnpw-eth0" Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.485 [INFO][3980] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:30.489960 env[1054]: 2024-04-12 19:08:30.487 [INFO][3973] k8s.go 598: Teardown processing complete. ContainerID="9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df" Apr 12 19:08:30.491186 env[1054]: time="2024-04-12T19:08:30.489905304Z" level=info msg="TearDown network for sandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" successfully" Apr 12 19:08:30.494692 env[1054]: time="2024-04-12T19:08:30.494652947Z" level=info msg="RemovePodSandbox \"9f05133244f8a5a1f4883f9c86c45f83cd7f91e5adad347a29da7c659b3902df\" returns successfully" Apr 12 19:08:30.495327 env[1054]: time="2024-04-12T19:08:30.495294434Z" level=info msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.566 [WARNING][4002] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5495f26f-8c56-4dab-8a63-476baf358108", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873", Pod:"coredns-5d78c9869d-gxqrw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia1cdf26f40b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.567 [INFO][4002] k8s.go 585: Cleaning up netns ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.567 [INFO][4002] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" iface="eth0" netns="" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.567 [INFO][4002] k8s.go 592: Releasing IP address(es) ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.567 [INFO][4002] utils.go 188: Calico CNI releasing IP address ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.605 [INFO][4008] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.605 [INFO][4008] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.605 [INFO][4008] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.612 [WARNING][4008] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.613 [INFO][4008] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.614 [INFO][4008] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:30.622469 env[1054]: 2024-04-12 19:08:30.616 [INFO][4002] k8s.go 598: Teardown processing complete. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.623970 env[1054]: time="2024-04-12T19:08:30.622527310Z" level=info msg="TearDown network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" successfully" Apr 12 19:08:30.623970 env[1054]: time="2024-04-12T19:08:30.622594918Z" level=info msg="StopPodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" returns successfully" Apr 12 19:08:30.623970 env[1054]: time="2024-04-12T19:08:30.623447763Z" level=info msg="RemovePodSandbox for \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" Apr 12 19:08:30.623970 env[1054]: time="2024-04-12T19:08:30.623482898Z" level=info msg="Forcibly stopping sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\"" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.697 [WARNING][4029] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5495f26f-8c56-4dab-8a63-476baf358108", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"579ccf574dfa15105b2baf33d1f4a4c87783ac55ba83563a7ba07f0f6f9f6873", Pod:"coredns-5d78c9869d-gxqrw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia1cdf26f40b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.697 [INFO][4029] k8s.go 585: Cleaning up netns ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.697 [INFO][4029] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" iface="eth0" netns="" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.697 [INFO][4029] k8s.go 592: Releasing IP address(es) ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.697 [INFO][4029] utils.go 188: Calico CNI releasing IP address ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.729 [INFO][4035] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.730 [INFO][4035] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.730 [INFO][4035] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.746 [WARNING][4035] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.746 [INFO][4035] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" HandleID="k8s-pod-network.0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--gxqrw-eth0" Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.750 [INFO][4035] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:30.755906 env[1054]: 2024-04-12 19:08:30.753 [INFO][4029] k8s.go 598: Teardown processing complete. ContainerID="0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589" Apr 12 19:08:30.755906 env[1054]: time="2024-04-12T19:08:30.755843392Z" level=info msg="TearDown network for sandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" successfully" Apr 12 19:08:30.761626 env[1054]: time="2024-04-12T19:08:30.761567753Z" level=info msg="RemovePodSandbox \"0ca570cfbe497959380e09a98910d8eee0798775d8e1fcd0039e98aa2a5a8589\" returns successfully" Apr 12 19:08:30.762261 env[1054]: time="2024-04-12T19:08:30.762203750Z" level=info msg="StopPodSandbox for \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\"" Apr 12 19:08:30.762376 env[1054]: time="2024-04-12T19:08:30.762316712Z" level=info msg="TearDown network for sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" successfully" Apr 12 19:08:30.762376 env[1054]: time="2024-04-12T19:08:30.762365925Z" level=info msg="StopPodSandbox for \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" returns successfully" Apr 12 19:08:30.762865 env[1054]: time="2024-04-12T19:08:30.762826300Z" level=info msg="RemovePodSandbox for \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\"" Apr 12 19:08:30.762930 env[1054]: time="2024-04-12T19:08:30.762858592Z" level=info msg="Forcibly stopping sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\"" Apr 12 19:08:30.762970 env[1054]: time="2024-04-12T19:08:30.762926149Z" level=info msg="TearDown network for sandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" successfully" Apr 12 19:08:30.767092 env[1054]: time="2024-04-12T19:08:30.767040660Z" level=info msg="RemovePodSandbox \"0bd0838299f4ec820ae223562b6e9dd973fbcf2c4f3f6d3b5167036a63a45915\" returns successfully" Apr 12 19:08:30.767610 env[1054]: time="2024-04-12T19:08:30.767572831Z" level=info msg="StopPodSandbox for \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\"" Apr 12 19:08:30.767703 env[1054]: time="2024-04-12T19:08:30.767657331Z" level=info msg="TearDown network for sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" successfully" Apr 12 19:08:30.767770 env[1054]: time="2024-04-12T19:08:30.767700582Z" level=info msg="StopPodSandbox for \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" returns successfully" Apr 12 19:08:30.768128 env[1054]: time="2024-04-12T19:08:30.768089423Z" level=info msg="RemovePodSandbox for \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\"" Apr 12 19:08:30.768190 env[1054]: time="2024-04-12T19:08:30.768119350Z" level=info msg="Forcibly stopping sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\"" Apr 12 19:08:30.768229 env[1054]: time="2024-04-12T19:08:30.768184122Z" level=info msg="TearDown network for sandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" successfully" Apr 12 19:08:30.773224 env[1054]: time="2024-04-12T19:08:30.773179090Z" level=info msg="RemovePodSandbox \"f389d020af8b85d4d0c82d0fa497d63677bd34afefe275e0ed3ade077556863c\" returns successfully" Apr 12 19:08:30.773764 env[1054]: time="2024-04-12T19:08:30.773734405Z" level=info msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.828 [WARNING][4056] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c99e7ae6-c1f2-4d5b-9c20-44a824491590", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351", Pod:"coredns-5d78c9869d-smbpx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4237160f600", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.829 [INFO][4056] k8s.go 585: Cleaning up netns ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.829 [INFO][4056] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" iface="eth0" netns="" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.829 [INFO][4056] k8s.go 592: Releasing IP address(es) ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.829 [INFO][4056] utils.go 188: Calico CNI releasing IP address ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.878 [INFO][4062] ipam_plugin.go 415: Releasing address using handleID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.879 [INFO][4062] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.879 [INFO][4062] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.888 [WARNING][4062] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.888 [INFO][4062] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.890 [INFO][4062] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:30.896275 env[1054]: 2024-04-12 19:08:30.893 [INFO][4056] k8s.go 598: Teardown processing complete. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:30.897631 env[1054]: time="2024-04-12T19:08:30.896328473Z" level=info msg="TearDown network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" successfully" Apr 12 19:08:30.897631 env[1054]: time="2024-04-12T19:08:30.896381653Z" level=info msg="StopPodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" returns successfully" Apr 12 19:08:30.897631 env[1054]: time="2024-04-12T19:08:30.897166299Z" level=info msg="RemovePodSandbox for \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" Apr 12 19:08:30.897631 env[1054]: time="2024-04-12T19:08:30.897208168Z" level=info msg="Forcibly stopping sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\"" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.957 [WARNING][4083] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c99e7ae6-c1f2-4d5b-9c20-44a824491590", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"bbb928fa61c045025bcdb80009cdcfc67b176deff9b5606342a6d0d5945b3351", Pod:"coredns-5d78c9869d-smbpx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4237160f600", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.957 [INFO][4083] k8s.go 585: Cleaning up netns ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.958 [INFO][4083] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" iface="eth0" netns="" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.958 [INFO][4083] k8s.go 592: Releasing IP address(es) ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.958 [INFO][4083] utils.go 188: Calico CNI releasing IP address ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.995 [INFO][4089] ipam_plugin.go 415: Releasing address using handleID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.995 [INFO][4089] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:30.995 [INFO][4089] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:31.003 [WARNING][4089] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:31.004 [INFO][4089] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" HandleID="k8s-pod-network.ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-coredns--5d78c9869d--smbpx-eth0" Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:31.005 [INFO][4089] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:31.011140 env[1054]: 2024-04-12 19:08:31.009 [INFO][4083] k8s.go 598: Teardown processing complete. ContainerID="ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7" Apr 12 19:08:31.013104 env[1054]: time="2024-04-12T19:08:31.011116532Z" level=info msg="TearDown network for sandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" successfully" Apr 12 19:08:31.169582 env[1054]: time="2024-04-12T19:08:31.169490248Z" level=info msg="RemovePodSandbox \"ae9149c1bffd382d72f1f152ae9c5e37630550895f75abcbcb005c2a525f72d7\" returns successfully" Apr 12 19:08:31.171043 env[1054]: time="2024-04-12T19:08:31.170987996Z" level=info msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.269 [WARNING][4109] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0", GenerateName:"calico-kube-controllers-7d9f58d455-", Namespace:"calico-system", SelfLink:"", UID:"2353a27f-988f-4310-b8c4-589932e0aaf5", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d9f58d455", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7", Pod:"calico-kube-controllers-7d9f58d455-mpqwb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43971d5d0be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.269 [INFO][4109] k8s.go 585: Cleaning up netns ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.269 [INFO][4109] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" iface="eth0" netns="" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.269 [INFO][4109] k8s.go 592: Releasing IP address(es) ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.269 [INFO][4109] utils.go 188: Calico CNI releasing IP address ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.307 [INFO][4115] ipam_plugin.go 415: Releasing address using handleID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.307 [INFO][4115] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.307 [INFO][4115] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.315 [WARNING][4115] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.315 [INFO][4115] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.317 [INFO][4115] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:31.323453 env[1054]: 2024-04-12 19:08:31.319 [INFO][4109] k8s.go 598: Teardown processing complete. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.324471 env[1054]: time="2024-04-12T19:08:31.324413573Z" level=info msg="TearDown network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" successfully" Apr 12 19:08:31.324575 env[1054]: time="2024-04-12T19:08:31.324548407Z" level=info msg="StopPodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" returns successfully" Apr 12 19:08:31.325692 env[1054]: time="2024-04-12T19:08:31.325660870Z" level=info msg="RemovePodSandbox for \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" Apr 12 19:08:31.325827 env[1054]: time="2024-04-12T19:08:31.325783470Z" level=info msg="Forcibly stopping sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\"" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.407 [WARNING][4136] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0", GenerateName:"calico-kube-controllers-7d9f58d455-", Namespace:"calico-system", SelfLink:"", UID:"2353a27f-988f-4310-b8c4-589932e0aaf5", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 7, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d9f58d455", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7", Pod:"calico-kube-controllers-7d9f58d455-mpqwb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43971d5d0be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.407 [INFO][4136] k8s.go 585: Cleaning up netns ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.408 [INFO][4136] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" iface="eth0" netns="" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.408 [INFO][4136] k8s.go 592: Releasing IP address(es) ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.408 [INFO][4136] utils.go 188: Calico CNI releasing IP address ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.440 [INFO][4142] ipam_plugin.go 415: Releasing address using handleID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.441 [INFO][4142] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.441 [INFO][4142] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.450 [WARNING][4142] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.450 [INFO][4142] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" HandleID="k8s-pod-network.68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--kube--controllers--7d9f58d455--mpqwb-eth0" Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.452 [INFO][4142] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:08:31.455880 env[1054]: 2024-04-12 19:08:31.454 [INFO][4136] k8s.go 598: Teardown processing complete. ContainerID="68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8" Apr 12 19:08:31.456629 env[1054]: time="2024-04-12T19:08:31.456588208Z" level=info msg="TearDown network for sandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" successfully" Apr 12 19:08:31.461387 env[1054]: time="2024-04-12T19:08:31.461357792Z" level=info msg="RemovePodSandbox \"68d573ee5c05e6a07c8251f361a2f59c65d24f4d843b09f8060d45f1061a7ce8\" returns successfully" Apr 12 19:08:31.707000 audit[3954]: USER_ACCT pid=3954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:31.710253 sshd[3954]: Accepted publickey for core from 172.24.4.1 port 58188 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:08:31.712000 audit[3954]: CRED_ACQ pid=3954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:31.712000 audit[3954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca89551d0 a2=3 a3=0 items=0 ppid=1 pid=3954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:31.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:31.716310 sshd[3954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:08:31.726845 systemd[1]: Started session-8.scope. Apr 12 19:08:31.727690 systemd-logind[1047]: New session 8 of user core. Apr 12 19:08:31.740000 audit[3954]: USER_START pid=3954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:31.743000 audit[4148]: CRED_ACQ pid=4148 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:31.783782 env[1054]: time="2024-04-12T19:08:31.783714398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:31.791263 env[1054]: time="2024-04-12T19:08:31.787593977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:31.797482 env[1054]: time="2024-04-12T19:08:31.797443819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:32.062747 env[1054]: time="2024-04-12T19:08:32.062512575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:32.065123 env[1054]: time="2024-04-12T19:08:32.065038597Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 19:08:32.068865 env[1054]: time="2024-04-12T19:08:32.068793250Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:08:32.194126 env[1054]: time="2024-04-12T19:08:32.191569947Z" level=info msg="CreateContainer within sandbox \"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 19:08:32.232323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount712289970.mount: Deactivated successfully. Apr 12 19:08:32.245608 env[1054]: time="2024-04-12T19:08:32.245539038Z" level=info msg="CreateContainer within sandbox \"6203c119ecd0ebd94fcd0ffd41f33a74a3b9204e51e92b270232ba6bba87b6d7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405\"" Apr 12 19:08:32.246754 env[1054]: time="2024-04-12T19:08:32.246708478Z" level=info msg="StartContainer for \"011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405\"" Apr 12 19:08:32.284074 systemd[1]: Started cri-containerd-011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405.scope. Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.306000 audit: BPF prog-id=191 op=LOAD Apr 12 19:08:32.308000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.308000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3623 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:32.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031316463323134336231323030633331373534323662656366383366 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3623 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:32.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031316463323134336231323030633331373534323662656366383366 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.309000 audit: BPF prog-id=192 op=LOAD Apr 12 19:08:32.309000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000024c10 items=0 ppid=3623 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:32.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031316463323134336231323030633331373534323662656366383366 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit: BPF prog-id=193 op=LOAD Apr 12 19:08:32.310000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000024c58 items=0 ppid=3623 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:32.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031316463323134336231323030633331373534323662656366383366 Apr 12 19:08:32.310000 audit: BPF prog-id=193 op=UNLOAD Apr 12 19:08:32.310000 audit: BPF prog-id=192 op=UNLOAD Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:32.310000 audit: BPF prog-id=194 op=LOAD Apr 12 19:08:32.310000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000025068 items=0 ppid=3623 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:32.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031316463323134336231323030633331373534323662656366383366 Apr 12 19:08:32.367781 env[1054]: time="2024-04-12T19:08:32.367662727Z" level=info msg="StartContainer for \"011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405\" returns successfully" Apr 12 19:08:32.964020 kubelet[1941]: I0412 19:08:32.963973 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7d9f58d455-mpqwb" podStartSLOduration=37.063171877 podCreationTimestamp="2024-04-12 19:07:51 +0000 UTC" firstStartedPulling="2024-04-12 19:08:27.167359826 +0000 UTC m=+58.159666902" lastFinishedPulling="2024-04-12 19:08:32.068081171 +0000 UTC m=+63.060388297" observedRunningTime="2024-04-12 19:08:32.911629669 +0000 UTC m=+63.903936745" watchObservedRunningTime="2024-04-12 19:08:32.963893272 +0000 UTC m=+63.956200358" Apr 12 19:08:32.966296 sshd[3954]: pam_unix(sshd:session): session closed for user core Apr 12 19:08:32.967000 audit[3954]: USER_END pid=3954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:32.967000 audit[3954]: CRED_DISP pid=3954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:32.969344 systemd[1]: sshd@7-172.24.4.96:22-172.24.4.1:58188.service: Deactivated successfully. Apr 12 19:08:32.970327 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 19:08:32.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.96:22-172.24.4.1:58188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:32.972583 systemd-logind[1047]: Session 8 logged out. Waiting for processes to exit. Apr 12 19:08:32.976354 systemd-logind[1047]: Removed session 8. Apr 12 19:08:33.596012 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2698523475.mount: Deactivated successfully. Apr 12 19:08:34.173975 env[1054]: time="2024-04-12T19:08:34.173909238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:34.177214 env[1054]: time="2024-04-12T19:08:34.177171264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:34.179379 env[1054]: time="2024-04-12T19:08:34.179342198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:34.181598 env[1054]: time="2024-04-12T19:08:34.181568375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:34.181901 env[1054]: time="2024-04-12T19:08:34.181869161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 19:08:34.189277 env[1054]: time="2024-04-12T19:08:34.189222532Z" level=info msg="CreateContainer within sandbox \"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:08:34.205887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785315664.mount: Deactivated successfully. Apr 12 19:08:34.213036 env[1054]: time="2024-04-12T19:08:34.212973839Z" level=info msg="CreateContainer within sandbox \"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8dda19bc3c91e765b98e0a83746759468e14cde5af90ee9373f78c5df96f4d45\"" Apr 12 19:08:34.215842 env[1054]: time="2024-04-12T19:08:34.215801458Z" level=info msg="StartContainer for \"8dda19bc3c91e765b98e0a83746759468e14cde5af90ee9373f78c5df96f4d45\"" Apr 12 19:08:34.239848 systemd[1]: Started cri-containerd-8dda19bc3c91e765b98e0a83746759468e14cde5af90ee9373f78c5df96f4d45.scope. Apr 12 19:08:34.259569 systemd[1]: run-containerd-runc-k8s.io-8dda19bc3c91e765b98e0a83746759468e14cde5af90ee9373f78c5df96f4d45-runc.NmBBij.mount: Deactivated successfully. Apr 12 19:08:34.298066 kernel: kauditd_printk_skb: 85 callbacks suppressed Apr 12 19:08:34.298258 kernel: audit: type=1400 audit(1712948914.293:1373): avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.316927 kernel: audit: type=1300 audit(1712948914.293:1373): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7909f567b8 items=0 ppid=3668 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:34.317013 kernel: audit: type=1327 audit(1712948914.293:1373): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646131396263336339316537363562393865306138333734363735 Apr 12 19:08:34.317056 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7909f567b8 items=0 ppid=3668 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:34.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646131396263336339316537363562393865306138333734363735 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.327800 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.327879 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.335297 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.343291 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.349297 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.354886 kernel: audit: type=1400 audit(1712948914.293:1374): avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.293000 audit: BPF prog-id=195 op=LOAD Apr 12 19:08:34.293000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c2778 items=0 ppid=3668 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:34.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646131396263336339316537363562393865306138333734363735 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit: BPF prog-id=196 op=LOAD Apr 12 19:08:34.297000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c27c8 items=0 ppid=3668 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:34.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646131396263336339316537363562393865306138333734363735 Apr 12 19:08:34.297000 audit: BPF prog-id=196 op=UNLOAD Apr 12 19:08:34.297000 audit: BPF prog-id=195 op=UNLOAD Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:34.297000 audit: BPF prog-id=197 op=LOAD Apr 12 19:08:34.297000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c2858 items=0 ppid=3668 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:34.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646131396263336339316537363562393865306138333734363735 Apr 12 19:08:34.362734 env[1054]: time="2024-04-12T19:08:34.361790285Z" level=info msg="StartContainer for \"8dda19bc3c91e765b98e0a83746759468e14cde5af90ee9373f78c5df96f4d45\" returns successfully" Apr 12 19:08:34.363450 env[1054]: time="2024-04-12T19:08:34.363412467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:08:36.618915 env[1054]: time="2024-04-12T19:08:36.618808924Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:36.622051 env[1054]: time="2024-04-12T19:08:36.621988194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:36.624940 env[1054]: time="2024-04-12T19:08:36.624900381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:36.628213 env[1054]: time="2024-04-12T19:08:36.628186933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:08:36.629836 env[1054]: time="2024-04-12T19:08:36.629759580Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 19:08:36.635388 env[1054]: time="2024-04-12T19:08:36.635090697Z" level=info msg="CreateContainer within sandbox \"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:08:36.670110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1401169481.mount: Deactivated successfully. Apr 12 19:08:36.689134 env[1054]: time="2024-04-12T19:08:36.689078245Z" level=info msg="CreateContainer within sandbox \"2bb42715ca38b68bc995e16be0724fc9401b1777c5b4bf4421a0575979882bb6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2929ce8faab25c6c67055d307e96bd5a7dcd7fac50f695511b0f610b2aae5ba5\"" Apr 12 19:08:36.690256 env[1054]: time="2024-04-12T19:08:36.690223268Z" level=info msg="StartContainer for \"2929ce8faab25c6c67055d307e96bd5a7dcd7fac50f695511b0f610b2aae5ba5\"" Apr 12 19:08:36.723180 systemd[1]: Started cri-containerd-2929ce8faab25c6c67055d307e96bd5a7dcd7fac50f695511b0f610b2aae5ba5.scope. Apr 12 19:08:36.732073 systemd[1]: run-containerd-runc-k8s.io-2929ce8faab25c6c67055d307e96bd5a7dcd7fac50f695511b0f610b2aae5ba5-runc.3bg1eP.mount: Deactivated successfully. Apr 12 19:08:36.764000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.764000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fed5437a988 items=0 ppid=3668 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323963653866616162323563366336373035356433303765393662 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.765000 audit: BPF prog-id=198 op=LOAD Apr 12 19:08:36.765000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000456138 items=0 ppid=3668 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:36.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323963653866616162323563366336373035356433303765393662 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit: BPF prog-id=199 op=LOAD Apr 12 19:08:36.767000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000456188 items=0 ppid=3668 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323963653866616162323563366336373035356433303765393662 Apr 12 19:08:36.767000 audit: BPF prog-id=199 op=UNLOAD Apr 12 19:08:36.767000 audit: BPF prog-id=198 op=UNLOAD Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:08:36.767000 audit: BPF prog-id=200 op=LOAD Apr 12 19:08:36.767000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000456218 items=0 ppid=3668 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239323963653866616162323563366336373035356433303765393662 Apr 12 19:08:36.794101 env[1054]: time="2024-04-12T19:08:36.794050623Z" level=info msg="StartContainer for \"2929ce8faab25c6c67055d307e96bd5a7dcd7fac50f695511b0f610b2aae5ba5\" returns successfully" Apr 12 19:08:36.921658 kubelet[1941]: I0412 19:08:36.921528 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2rnpw" podStartSLOduration=37.549845578 podCreationTimestamp="2024-04-12 19:07:50 +0000 UTC" firstStartedPulling="2024-04-12 19:08:27.258824874 +0000 UTC m=+58.251131950" lastFinishedPulling="2024-04-12 19:08:36.630452192 +0000 UTC m=+67.622759318" observedRunningTime="2024-04-12 19:08:36.921290543 +0000 UTC m=+67.913597629" watchObservedRunningTime="2024-04-12 19:08:36.921472946 +0000 UTC m=+67.913780022" Apr 12 19:08:37.529892 kubelet[1941]: I0412 19:08:37.529739 1941 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:08:37.544161 kubelet[1941]: I0412 19:08:37.544087 1941 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:08:37.982064 systemd[1]: Started sshd@8-172.24.4.96:22-172.24.4.1:58084.service. Apr 12 19:08:37.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.96:22-172.24.4.1:58084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:40.133309 kernel: kauditd_printk_skb: 77 callbacks suppressed Apr 12 19:08:40.133612 kernel: audit: type=1101 audit(1712948920.130:1386): pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.130000 audit[4321]: USER_ACCT pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.134291 sshd[4321]: Accepted publickey for core from 172.24.4.1 port 58084 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:08:40.146000 audit[4321]: CRED_ACQ pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.160293 kernel: audit: type=1103 audit(1712948920.146:1387): pid=4321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.172752 kernel: audit: type=1006 audit(1712948920.146:1388): pid=4321 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 19:08:40.173043 kernel: audit: type=1300 audit(1712948920.146:1388): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebbf033c0 a2=3 a3=0 items=0 ppid=1 pid=4321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:40.146000 audit[4321]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebbf033c0 a2=3 a3=0 items=0 ppid=1 pid=4321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:40.164564 sshd[4321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:08:40.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:40.191512 kernel: audit: type=1327 audit(1712948920.146:1388): proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:40.198832 systemd-logind[1047]: New session 9 of user core. Apr 12 19:08:40.203440 systemd[1]: Started session-9.scope. Apr 12 19:08:40.227328 kernel: audit: type=1105 audit(1712948920.221:1389): pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.221000 audit[4321]: USER_START pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.227000 audit[4331]: CRED_ACQ pid=4331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:40.233259 kernel: audit: type=1103 audit(1712948920.227:1390): pid=4331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:41.160177 sshd[4321]: pam_unix(sshd:session): session closed for user core Apr 12 19:08:41.163000 audit[4321]: USER_END pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:41.166380 systemd[1]: sshd@8-172.24.4.96:22-172.24.4.1:58084.service: Deactivated successfully. Apr 12 19:08:41.167974 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 19:08:41.163000 audit[4321]: CRED_DISP pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:41.178433 systemd-logind[1047]: Session 9 logged out. Waiting for processes to exit. Apr 12 19:08:41.180798 systemd-logind[1047]: Removed session 9. Apr 12 19:08:41.187052 kernel: audit: type=1106 audit(1712948921.163:1391): pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:41.188416 kernel: audit: type=1104 audit(1712948921.163:1392): pid=4321 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:41.188502 kernel: audit: type=1131 audit(1712948921.166:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.96:22-172.24.4.1:58084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:41.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.96:22-172.24.4.1:58084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:43.866063 systemd[1]: run-containerd-runc-k8s.io-011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405-runc.rEZreD.mount: Deactivated successfully. Apr 12 19:08:46.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.96:22-172.24.4.1:60720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:46.173919 systemd[1]: Started sshd@9-172.24.4.96:22-172.24.4.1:60720.service. Apr 12 19:08:46.185335 kernel: audit: type=1130 audit(1712948926.173:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.96:22-172.24.4.1:60720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:48.714022 sshd[4364]: Accepted publickey for core from 172.24.4.1 port 60720 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:08:48.712000 audit[4364]: USER_ACCT pid=4364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.726788 kernel: audit: type=1101 audit(1712948928.712:1395): pid=4364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.727469 sshd[4364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:08:48.726000 audit[4364]: CRED_ACQ pid=4364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.739633 kernel: audit: type=1103 audit(1712948928.726:1396): pid=4364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.750105 kernel: audit: type=1006 audit(1712948928.726:1397): pid=4364 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 19:08:48.726000 audit[4364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94e3d8a0 a2=3 a3=0 items=0 ppid=1 pid=4364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:48.757851 systemd-logind[1047]: New session 10 of user core. Apr 12 19:08:48.765693 kernel: audit: type=1300 audit(1712948928.726:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94e3d8a0 a2=3 a3=0 items=0 ppid=1 pid=4364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:48.760232 systemd[1]: Started session-10.scope. Apr 12 19:08:48.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:48.774264 kernel: audit: type=1327 audit(1712948928.726:1397): proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:48.772000 audit[4364]: USER_START pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.792885 kernel: audit: type=1105 audit(1712948928.772:1398): pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.791000 audit[4379]: CRED_ACQ pid=4379 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:48.805374 kernel: audit: type=1103 audit(1712948928.791:1399): pid=4379 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:49.818133 sshd[4364]: pam_unix(sshd:session): session closed for user core Apr 12 19:08:49.819000 audit[4364]: USER_END pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:49.826641 systemd[1]: sshd@9-172.24.4.96:22-172.24.4.1:60720.service: Deactivated successfully. Apr 12 19:08:49.829365 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 19:08:49.834541 systemd-logind[1047]: Session 10 logged out. Waiting for processes to exit. Apr 12 19:08:49.836349 kernel: audit: type=1106 audit(1712948929.819:1400): pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:49.837595 systemd[1]: Started sshd@10-172.24.4.96:22-172.24.4.1:60728.service. Apr 12 19:08:49.820000 audit[4364]: CRED_DISP pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:49.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.96:22-172.24.4.1:60720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:49.849422 kernel: audit: type=1104 audit(1712948929.820:1401): pid=4364 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:49.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.96:22-172.24.4.1:60728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:49.849827 systemd-logind[1047]: Removed session 10. Apr 12 19:08:51.265000 audit[4390]: USER_ACCT pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.267342 sshd[4390]: Accepted publickey for core from 172.24.4.1 port 60728 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:08:51.269495 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:08:51.269577 kernel: audit: type=1101 audit(1712948931.265:1404): pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.271285 sshd[4390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:08:51.269000 audit[4390]: CRED_ACQ pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.286896 kernel: audit: type=1103 audit(1712948931.269:1405): pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.287585 kernel: audit: type=1006 audit(1712948931.269:1406): pid=4390 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 19:08:51.269000 audit[4390]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbc10c90 a2=3 a3=0 items=0 ppid=1 pid=4390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:51.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:51.297743 kernel: audit: type=1300 audit(1712948931.269:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbc10c90 a2=3 a3=0 items=0 ppid=1 pid=4390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:51.297843 kernel: audit: type=1327 audit(1712948931.269:1406): proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:51.301683 systemd-logind[1047]: New session 11 of user core. Apr 12 19:08:51.302550 systemd[1]: Started session-11.scope. Apr 12 19:08:51.307000 audit[4390]: USER_START pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.314287 kernel: audit: type=1105 audit(1712948931.307:1407): pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.313000 audit[4393]: CRED_ACQ pid=4393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:51.320296 kernel: audit: type=1103 audit(1712948931.313:1408): pid=4393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:52.587427 systemd[1]: Started sshd@11-172.24.4.96:22-172.24.4.1:60734.service. Apr 12 19:08:52.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.96:22-172.24.4.1:60734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:52.589561 sshd[4390]: pam_unix(sshd:session): session closed for user core Apr 12 19:08:52.593865 kernel: audit: type=1130 audit(1712948932.586:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.96:22-172.24.4.1:60734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:52.598000 audit[4390]: USER_END pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:52.598000 audit[4390]: CRED_DISP pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:52.609448 kernel: audit: type=1106 audit(1712948932.598:1410): pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:52.609517 kernel: audit: type=1104 audit(1712948932.598:1411): pid=4390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:52.619428 systemd[1]: sshd@10-172.24.4.96:22-172.24.4.1:60728.service: Deactivated successfully. Apr 12 19:08:52.620640 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 19:08:52.621943 systemd-logind[1047]: Session 11 logged out. Waiting for processes to exit. Apr 12 19:08:52.623159 systemd-logind[1047]: Removed session 11. Apr 12 19:08:52.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.96:22-172.24.4.1:60728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:54.751000 audit[4401]: USER_ACCT pid=4401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:54.753064 sshd[4401]: Accepted publickey for core from 172.24.4.1 port 60734 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:08:54.752000 audit[4401]: CRED_ACQ pid=4401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:54.753000 audit[4401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2720690 a2=3 a3=0 items=0 ppid=1 pid=4401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:08:54.753000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:08:54.757987 sshd[4401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:08:54.764427 systemd[1]: Started session-12.scope. Apr 12 19:08:54.766060 systemd-logind[1047]: New session 12 of user core. Apr 12 19:08:54.771000 audit[4401]: USER_START pid=4401 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:54.773000 audit[4404]: CRED_ACQ pid=4404 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:55.704648 sshd[4401]: pam_unix(sshd:session): session closed for user core Apr 12 19:08:55.705000 audit[4401]: USER_END pid=4401 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:55.705000 audit[4401]: CRED_DISP pid=4401 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:08:55.710193 systemd[1]: sshd@11-172.24.4.96:22-172.24.4.1:60734.service: Deactivated successfully. Apr 12 19:08:55.711037 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 19:08:55.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.96:22-172.24.4.1:60734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:08:55.712048 systemd-logind[1047]: Session 12 logged out. Waiting for processes to exit. Apr 12 19:08:55.712918 systemd-logind[1047]: Removed session 12. Apr 12 19:09:00.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.96:22-172.24.4.1:33880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:00.720539 systemd[1]: Started sshd@12-172.24.4.96:22-172.24.4.1:33880.service. Apr 12 19:09:00.729368 kernel: kauditd_printk_skb: 11 callbacks suppressed Apr 12 19:09:00.729494 kernel: audit: type=1130 audit(1712948940.719:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.96:22-172.24.4.1:33880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:01.991000 audit[4425]: USER_ACCT pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:01.994821 sshd[4425]: Accepted publickey for core from 172.24.4.1 port 33880 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:02.004298 kernel: audit: type=1101 audit(1712948941.991:1422): pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.004654 sshd[4425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:02.002000 audit[4425]: CRED_ACQ pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.031361 kernel: audit: type=1103 audit(1712948942.002:1423): pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.040715 kernel: audit: type=1006 audit(1712948942.002:1424): pid=4425 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 19:09:02.002000 audit[4425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd75ccff00 a2=3 a3=0 items=0 ppid=1 pid=4425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:02.053716 kernel: audit: type=1300 audit(1712948942.002:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd75ccff00 a2=3 a3=0 items=0 ppid=1 pid=4425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:02.060175 kernel: audit: type=1327 audit(1712948942.002:1424): proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:02.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:02.053422 systemd[1]: Started session-13.scope. Apr 12 19:09:02.055440 systemd-logind[1047]: New session 13 of user core. Apr 12 19:09:02.071000 audit[4425]: USER_START pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.075000 audit[4427]: CRED_ACQ pid=4427 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.082827 kernel: audit: type=1105 audit(1712948942.071:1425): pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.082969 kernel: audit: type=1103 audit(1712948942.075:1426): pid=4427 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.313456 systemd[1]: run-containerd-runc-k8s.io-20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed-runc.9yycM9.mount: Deactivated successfully. Apr 12 19:09:02.816622 sshd[4425]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:02.817000 audit[4425]: USER_END pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.834303 kernel: audit: type=1106 audit(1712948942.817:1427): pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.834437 kernel: audit: type=1104 audit(1712948942.818:1428): pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.818000 audit[4425]: CRED_DISP pid=4425 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:02.832565 systemd[1]: sshd@12-172.24.4.96:22-172.24.4.1:33880.service: Deactivated successfully. Apr 12 19:09:02.834237 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 19:09:02.843792 systemd-logind[1047]: Session 13 logged out. Waiting for processes to exit. Apr 12 19:09:02.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.96:22-172.24.4.1:33880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:02.847830 systemd-logind[1047]: Removed session 13. Apr 12 19:09:07.831292 systemd[1]: Started sshd@13-172.24.4.96:22-172.24.4.1:34534.service. Apr 12 19:09:07.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.96:22-172.24.4.1:34534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:07.836210 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:09:07.836373 kernel: audit: type=1130 audit(1712948947.831:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.96:22-172.24.4.1:34534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:09.243000 audit[4463]: USER_ACCT pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.256084 sshd[4463]: Accepted publickey for core from 172.24.4.1 port 34534 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:09.256731 kernel: audit: type=1101 audit(1712948949.243:1431): pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.255000 audit[4463]: CRED_ACQ pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.257519 sshd[4463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:09.274676 kernel: audit: type=1103 audit(1712948949.255:1432): pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.274928 kernel: audit: type=1006 audit(1712948949.255:1433): pid=4463 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 19:09:09.255000 audit[4463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f821290 a2=3 a3=0 items=0 ppid=1 pid=4463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:09.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:09.290756 kernel: audit: type=1300 audit(1712948949.255:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f821290 a2=3 a3=0 items=0 ppid=1 pid=4463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:09.290900 kernel: audit: type=1327 audit(1712948949.255:1433): proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:09.298349 systemd-logind[1047]: New session 14 of user core. Apr 12 19:09:09.298998 systemd[1]: Started session-14.scope. Apr 12 19:09:09.310000 audit[4463]: USER_START pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.324308 kernel: audit: type=1105 audit(1712948949.310:1434): pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.326000 audit[4473]: CRED_ACQ pid=4473 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:09.333325 kernel: audit: type=1103 audit(1712948949.326:1435): pid=4473 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:10.257997 sshd[4463]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:10.259000 audit[4463]: USER_END pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:10.265170 systemd[1]: sshd@13-172.24.4.96:22-172.24.4.1:34534.service: Deactivated successfully. Apr 12 19:09:10.267133 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 19:09:10.273345 kernel: audit: type=1106 audit(1712948950.259:1436): pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:10.259000 audit[4463]: CRED_DISP pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:10.283814 systemd-logind[1047]: Session 14 logged out. Waiting for processes to exit. Apr 12 19:09:10.284388 kernel: audit: type=1104 audit(1712948950.259:1437): pid=4463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:10.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.96:22-172.24.4.1:34534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:10.286016 systemd-logind[1047]: Removed session 14. Apr 12 19:09:13.867966 systemd[1]: run-containerd-runc-k8s.io-011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405-runc.QnVMxY.mount: Deactivated successfully. Apr 12 19:09:14.599859 update_engine[1048]: I0412 19:09:14.598158 1048 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 19:09:14.599859 update_engine[1048]: I0412 19:09:14.599784 1048 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 19:09:14.613936 update_engine[1048]: I0412 19:09:14.613770 1048 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 19:09:14.619287 update_engine[1048]: I0412 19:09:14.619179 1048 omaha_request_params.cc:62] Current group set to lts Apr 12 19:09:14.625301 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:09:14.625437 kernel: audit: type=1325 audit(1712948954.620:1439): table=filter:116 family=2 entries=9 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.620000 audit[4507]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.620000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe89f7a790 a2=0 a3=7ffe89f7a77c items=0 ppid=2116 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.632195 kernel: audit: type=1300 audit(1712948954.620:1439): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe89f7a790 a2=0 a3=7ffe89f7a77c items=0 ppid=2116 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.638277 kernel: audit: type=1327 audit(1712948954.620:1439): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.623000 audit[4507]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.643294 kernel: audit: type=1325 audit(1712948954.623:1440): table=nat:117 family=2 entries=20 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.623000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe89f7a790 a2=0 a3=7ffe89f7a77c items=0 ppid=2116 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.649302 kernel: audit: type=1300 audit(1712948954.623:1440): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe89f7a790 a2=0 a3=7ffe89f7a77c items=0 ppid=2116 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.655453 kernel: audit: type=1327 audit(1712948954.623:1440): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.658464 update_engine[1048]: I0412 19:09:14.658231 1048 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 19:09:14.658464 update_engine[1048]: I0412 19:09:14.658288 1048 update_attempter.cc:643] Scheduling an action processor start. Apr 12 19:09:14.661282 kubelet[1941]: I0412 19:09:14.661226 1941 topology_manager.go:212] "Topology Admit Handler" Apr 12 19:09:14.663368 update_engine[1048]: I0412 19:09:14.663286 1048 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 19:09:14.666866 update_engine[1048]: I0412 19:09:14.666322 1048 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 19:09:14.666866 update_engine[1048]: I0412 19:09:14.666414 1048 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 19:09:14.666866 update_engine[1048]: I0412 19:09:14.666421 1048 omaha_request_action.cc:271] Request: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: Apr 12 19:09:14.666866 update_engine[1048]: I0412 19:09:14.666426 1048 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:09:14.670892 systemd[1]: Created slice kubepods-besteffort-poda7df645f_e276_46dc_8bd0_b7c92cc1b95a.slice. Apr 12 19:09:14.693543 update_engine[1048]: I0412 19:09:14.693499 1048 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:09:14.693787 update_engine[1048]: E0412 19:09:14.693641 1048 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:09:14.693787 update_engine[1048]: I0412 19:09:14.693710 1048 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 19:09:14.716000 audit[4512]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.716000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffe2ec7c10 a2=0 a3=7fffe2ec7bfc items=0 ppid=2116 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.729045 kernel: audit: type=1325 audit(1712948954.716:1441): table=filter:118 family=2 entries=10 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.729366 kernel: audit: type=1300 audit(1712948954.716:1441): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffe2ec7c10 a2=0 a3=7fffe2ec7bfc items=0 ppid=2116 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.737276 kernel: audit: type=1327 audit(1712948954.716:1441): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.716000 audit[4512]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.741586 kernel: audit: type=1325 audit(1712948954.716:1442): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:14.716000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffe2ec7c10 a2=0 a3=7fffe2ec7bfc items=0 ppid=2116 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:14.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:14.743985 kubelet[1941]: I0412 19:09:14.743673 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2r6bk\" (UniqueName: \"kubernetes.io/projected/a7df645f-e276-46dc-8bd0-b7c92cc1b95a-kube-api-access-2r6bk\") pod \"calico-apiserver-68769dc6cc-8fk29\" (UID: \"a7df645f-e276-46dc-8bd0-b7c92cc1b95a\") " pod="calico-apiserver/calico-apiserver-68769dc6cc-8fk29" Apr 12 19:09:14.743985 kubelet[1941]: I0412 19:09:14.743738 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a7df645f-e276-46dc-8bd0-b7c92cc1b95a-calico-apiserver-certs\") pod \"calico-apiserver-68769dc6cc-8fk29\" (UID: \"a7df645f-e276-46dc-8bd0-b7c92cc1b95a\") " pod="calico-apiserver/calico-apiserver-68769dc6cc-8fk29" Apr 12 19:09:14.761524 locksmithd[1098]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 19:09:14.976383 env[1054]: time="2024-04-12T19:09:14.976011326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68769dc6cc-8fk29,Uid:a7df645f-e276-46dc-8bd0-b7c92cc1b95a,Namespace:calico-apiserver,Attempt:0,}" Apr 12 19:09:15.264397 systemd[1]: Started sshd@14-172.24.4.96:22-172.24.4.1:41692.service. Apr 12 19:09:15.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.96:22-172.24.4.1:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:15.480718 systemd-networkd[970]: cali99408b9767d: Link UP Apr 12 19:09:15.484442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:09:15.484529 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali99408b9767d: link becomes ready Apr 12 19:09:15.484224 systemd-networkd[970]: cali99408b9767d: Gained carrier Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.269 [INFO][4515] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0 calico-apiserver-68769dc6cc- calico-apiserver a7df645f-e276-46dc-8bd0-b7c92cc1b95a 1122 0 2024-04-12 19:09:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68769dc6cc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-5-ba19de9024.novalocal calico-apiserver-68769dc6cc-8fk29 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali99408b9767d [] []}} ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.270 [INFO][4515] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.402 [INFO][4528] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" HandleID="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.422 [INFO][4528] ipam_plugin.go 268: Auto assigning IP ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" HandleID="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000274a70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-5-ba19de9024.novalocal", "pod":"calico-apiserver-68769dc6cc-8fk29", "timestamp":"2024-04-12 19:09:15.402758582 +0000 UTC"}, Hostname:"ci-3510-3-3-5-ba19de9024.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.422 [INFO][4528] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.422 [INFO][4528] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.422 [INFO][4528] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-5-ba19de9024.novalocal' Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.425 [INFO][4528] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.432 [INFO][4528] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.438 [INFO][4528] ipam.go 489: Trying affinity for 192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.441 [INFO][4528] ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.444 [INFO][4528] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.444 [INFO][4528] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.446 [INFO][4528] ipam.go 1682: Creating new handle: k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69 Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.460 [INFO][4528] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.471 [INFO][4528] ipam.go 1216: Successfully claimed IPs: [192.168.110.5/26] block=192.168.110.0/26 handle="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.471 [INFO][4528] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.5/26] handle="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" host="ci-3510-3-3-5-ba19de9024.novalocal" Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.472 [INFO][4528] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:09:15.504316 env[1054]: 2024-04-12 19:09:15.472 [INFO][4528] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.5/26] IPv6=[] ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" HandleID="k8s-pod-network.2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Workload="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.475 [INFO][4515] k8s.go 385: Populated endpoint ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0", GenerateName:"calico-apiserver-68769dc6cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"a7df645f-e276-46dc-8bd0-b7c92cc1b95a", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 9, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68769dc6cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"", Pod:"calico-apiserver-68769dc6cc-8fk29", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali99408b9767d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.475 [INFO][4515] k8s.go 386: Calico CNI using IPs: [192.168.110.5/32] ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.475 [INFO][4515] dataplane_linux.go 68: Setting the host side veth name to cali99408b9767d ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.484 [INFO][4515] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.485 [INFO][4515] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0", GenerateName:"calico-apiserver-68769dc6cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"a7df645f-e276-46dc-8bd0-b7c92cc1b95a", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 9, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68769dc6cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-5-ba19de9024.novalocal", ContainerID:"2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69", Pod:"calico-apiserver-68769dc6cc-8fk29", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali99408b9767d", MAC:"ba:da:67:f1:bc:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:09:15.505043 env[1054]: 2024-04-12 19:09:15.498 [INFO][4515] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69" Namespace="calico-apiserver" Pod="calico-apiserver-68769dc6cc-8fk29" WorkloadEndpoint="ci--3510--3--3--5--ba19de9024.novalocal-k8s-calico--apiserver--68769dc6cc--8fk29-eth0" Apr 12 19:09:15.534678 env[1054]: time="2024-04-12T19:09:15.534504825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:09:15.534883 env[1054]: time="2024-04-12T19:09:15.534857758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:09:15.536451 env[1054]: time="2024-04-12T19:09:15.536423358Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:09:15.536729 env[1054]: time="2024-04-12T19:09:15.536697814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69 pid=4561 runtime=io.containerd.runc.v2 Apr 12 19:09:15.560413 systemd[1]: Started cri-containerd-2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69.scope. Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.576000 audit: BPF prog-id=201 op=LOAD Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4561 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239373664643135353664623866636138343038356334363935633035 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4561 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239373664643135353664623866636138343038356334363935633035 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.577000 audit: BPF prog-id=202 op=LOAD Apr 12 19:09:15.577000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00030ba40 items=0 ppid=4561 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239373664643135353664623866636138343038356334363935633035 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit: BPF prog-id=203 op=LOAD Apr 12 19:09:15.580000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00030ba88 items=0 ppid=4561 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239373664643135353664623866636138343038356334363935633035 Apr 12 19:09:15.580000 audit: BPF prog-id=203 op=UNLOAD Apr 12 19:09:15.580000 audit: BPF prog-id=202 op=UNLOAD Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:15.580000 audit: BPF prog-id=204 op=LOAD Apr 12 19:09:15.580000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00030be98 items=0 ppid=4561 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239373664643135353664623866636138343038356334363935633035 Apr 12 19:09:15.614000 audit[4589]: NETFILTER_CFG table=filter:120 family=2 entries=55 op=nft_register_chain pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:09:15.614000 audit[4589]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7ffd323b6470 a2=0 a3=7ffd323b645c items=0 ppid=3299 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:15.614000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:09:15.631420 env[1054]: time="2024-04-12T19:09:15.631371571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68769dc6cc-8fk29,Uid:a7df645f-e276-46dc-8bd0-b7c92cc1b95a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69\"" Apr 12 19:09:15.635098 env[1054]: time="2024-04-12T19:09:15.635066641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 19:09:16.819000 audit[4527]: USER_ACCT pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:16.821126 sshd[4527]: Accepted publickey for core from 172.24.4.1 port 41692 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:16.821000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:16.822000 audit[4527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9f11070 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:16.822000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:16.866286 sshd[4527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:16.883491 systemd-logind[1047]: New session 15 of user core. Apr 12 19:09:16.885476 systemd[1]: Started session-15.scope. Apr 12 19:09:16.898000 audit[4527]: USER_START pid=4527 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:16.902000 audit[4598]: CRED_ACQ pid=4598 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:17.250204 systemd-networkd[970]: cali99408b9767d: Gained IPv6LL Apr 12 19:09:18.112575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2563243700.mount: Deactivated successfully. Apr 12 19:09:18.759035 sshd[4527]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:18.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.96:22-172.24.4.1:41702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:18.762883 systemd[1]: Started sshd@15-172.24.4.96:22-172.24.4.1:41702.service. Apr 12 19:09:18.769000 audit[4527]: USER_END pid=4527 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:18.769000 audit[4527]: CRED_DISP pid=4527 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:18.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.96:22-172.24.4.1:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:18.772664 systemd[1]: sshd@14-172.24.4.96:22-172.24.4.1:41692.service: Deactivated successfully. Apr 12 19:09:18.773791 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 19:09:18.775765 systemd-logind[1047]: Session 15 logged out. Waiting for processes to exit. Apr 12 19:09:18.779962 systemd-logind[1047]: Removed session 15. Apr 12 19:09:20.206463 kernel: kauditd_printk_skb: 74 callbacks suppressed Apr 12 19:09:20.206631 kernel: audit: type=1101 audit(1712948960.200:1472): pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.200000 audit[4607]: USER_ACCT pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.205000 audit[4607]: CRED_ACQ pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.207707 sshd[4607]: Accepted publickey for core from 172.24.4.1 port 41702 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:20.207268 sshd[4607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:20.215858 kernel: audit: type=1103 audit(1712948960.205:1473): pid=4607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.230409 kernel: audit: type=1006 audit(1712948960.205:1474): pid=4607 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 19:09:20.230513 kernel: audit: type=1300 audit(1712948960.205:1474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfd5e49e0 a2=3 a3=0 items=0 ppid=1 pid=4607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:20.205000 audit[4607]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfd5e49e0 a2=3 a3=0 items=0 ppid=1 pid=4607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:20.228065 systemd[1]: Started session-16.scope. Apr 12 19:09:20.230028 systemd-logind[1047]: New session 16 of user core. Apr 12 19:09:20.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:20.238302 kernel: audit: type=1327 audit(1712948960.205:1474): proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:20.237000 audit[4607]: USER_START pid=4607 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.244404 kernel: audit: type=1105 audit(1712948960.237:1475): pid=4607 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.243000 audit[4615]: CRED_ACQ pid=4615 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:20.249291 kernel: audit: type=1103 audit(1712948960.243:1476): pid=4615 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:22.680000 audit[4623]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:22.690510 kernel: audit: type=1325 audit(1712948962.680:1477): table=filter:121 family=2 entries=10 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:22.680000 audit[4623]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca1886d90 a2=0 a3=7ffca1886d7c items=0 ppid=2116 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:22.698261 kernel: audit: type=1300 audit(1712948962.680:1477): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca1886d90 a2=0 a3=7ffca1886d7c items=0 ppid=2116 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:22.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:22.702412 kernel: audit: type=1327 audit(1712948962.680:1477): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:22.728000 audit[4623]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:22.728000 audit[4623]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca1886d90 a2=0 a3=7ffca1886d7c items=0 ppid=2116 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:22.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:23.094000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:23.094000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000562a0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:23.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:23.094000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:23.094000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025a5ba0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:23.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:23.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.96:22-172.24.4.1:41718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:23.144302 sshd[4607]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:23.143735 systemd[1]: Started sshd@16-172.24.4.96:22-172.24.4.1:41718.service. Apr 12 19:09:23.150000 audit[4607]: USER_END pid=4607 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:23.151000 audit[4607]: CRED_DISP pid=4607 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:23.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.96:22-172.24.4.1:41702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:23.154393 systemd[1]: sshd@15-172.24.4.96:22-172.24.4.1:41702.service: Deactivated successfully. Apr 12 19:09:23.155324 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 19:09:23.157577 systemd-logind[1047]: Session 16 logged out. Waiting for processes to exit. Apr 12 19:09:23.159497 systemd-logind[1047]: Removed session 16. Apr 12 19:09:23.548023 env[1054]: time="2024-04-12T19:09:23.547842971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:09:23.550829 env[1054]: time="2024-04-12T19:09:23.550788893Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:09:23.552724 env[1054]: time="2024-04-12T19:09:23.552688439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:09:23.554722 env[1054]: time="2024-04-12T19:09:23.554688425Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:09:23.555199 env[1054]: time="2024-04-12T19:09:23.555172895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 19:09:23.560741 env[1054]: time="2024-04-12T19:09:23.560689895Z" level=info msg="CreateContainer within sandbox \"2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 19:09:23.580899 env[1054]: time="2024-04-12T19:09:23.580829996Z" level=info msg="CreateContainer within sandbox \"2976dd1556db8fca84085c4695c05fd64a836fb0391a2869363a10998e1a3a69\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2\"" Apr 12 19:09:23.582026 env[1054]: time="2024-04-12T19:09:23.582001516Z" level=info msg="StartContainer for \"71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2\"" Apr 12 19:09:23.614730 systemd[1]: run-containerd-runc-k8s.io-71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2-runc.qmY7wS.mount: Deactivated successfully. Apr 12 19:09:23.622661 systemd[1]: Started cri-containerd-71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2.scope. Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.651000 audit: BPF prog-id=205 op=LOAD Apr 12 19:09:23.653000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.653000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4561 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:23.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731303638626161376466633039326232303430393939333437613430 Apr 12 19:09:23.654000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.654000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4561 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:23.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731303638626161376466633039326232303430393939333437613430 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit: BPF prog-id=206 op=LOAD Apr 12 19:09:23.655000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b46d0 items=0 ppid=4561 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:23.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731303638626161376466633039326232303430393939333437613430 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.655000 audit: BPF prog-id=207 op=LOAD Apr 12 19:09:23.655000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b4718 items=0 ppid=4561 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:23.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731303638626161376466633039326232303430393939333437613430 Apr 12 19:09:23.659000 audit: BPF prog-id=207 op=UNLOAD Apr 12 19:09:23.659000 audit: BPF prog-id=206 op=UNLOAD Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:09:23.659000 audit: BPF prog-id=208 op=LOAD Apr 12 19:09:23.659000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b4b28 items=0 ppid=4561 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:23.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731303638626161376466633039326232303430393939333437613430 Apr 12 19:09:23.713207 env[1054]: time="2024-04-12T19:09:23.713144273Z" level=info msg="StartContainer for \"71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2\" returns successfully" Apr 12 19:09:24.568397 update_engine[1048]: I0412 19:09:24.567380 1048 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:09:24.568397 update_engine[1048]: I0412 19:09:24.567801 1048 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:09:24.568397 update_engine[1048]: E0412 19:09:24.568142 1048 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:09:24.568397 update_engine[1048]: I0412 19:09:24.568325 1048 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 19:09:24.599000 audit[4671]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4671 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:24.599000 audit[4671]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb67518f0 a2=0 a3=7ffcb67518dc items=0 ppid=2116 pid=4671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:24.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:24.602000 audit[4671]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4671 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:24.602000 audit[4671]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb67518f0 a2=0 a3=7ffcb67518dc items=0 ppid=2116 pid=4671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:24.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:24.753000 audit[4650]: AVC avc: denied { watch } for pid=4650 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_09_14.1138605171/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c320,c1021 tclass=file permissive=0 Apr 12 19:09:24.753000 audit[4650]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c97dc0 a2=fc6 a3=0 items=0 ppid=4561 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c1021 key=(null) Apr 12 19:09:24.753000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:09:25.000000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:25.003114 sshd[4626]: Accepted publickey for core from 172.24.4.1 port 41718 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:25.001000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:25.002000 audit[4626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4da0fd70 a2=3 a3=0 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:25.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:25.007213 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:25.013645 systemd-logind[1047]: New session 17 of user core. Apr 12 19:09:25.014480 systemd[1]: Started session-17.scope. Apr 12 19:09:25.020000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:25.021000 audit[4672]: CRED_ACQ pid=4672 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:25.459857 kernel: kauditd_printk_skb: 86 callbacks suppressed Apr 12 19:09:25.460025 kernel: audit: type=1400 audit(1712948965.452:1511): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.452000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.464640 kernel: audit: type=1400 audit(1712948965.452:1512): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.452000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.452000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0083cf3b0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.471303 kernel: audit: type=1300 audit(1712948965.452:1511): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0083cf3b0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.452000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.452000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c014582f90 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.481976 kernel: audit: type=1327 audit(1712948965.452:1511): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.482054 kernel: audit: type=1300 audit(1712948965.452:1512): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c014582f90 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.452000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.464000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.491951 kernel: audit: type=1327 audit(1712948965.452:1512): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.492752 kernel: audit: type=1400 audit(1712948965.464:1513): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.492789 kernel: audit: type=1300 audit(1712948965.464:1513): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c009fbf560 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.464000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c009fbf560 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.503941 kernel: audit: type=1327 audit(1712948965.464:1513): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.504024 kernel: audit: type=1400 audit(1712948965.464:1514): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.464000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.464000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c014582ff0 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.470000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.470000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c009fbf700 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:25.470000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:25.470000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c014583170 a2=fc6 a3=0 items=0 ppid=1650 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c24,c680 key=(null) Apr 12 19:09:25.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3936002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 19:09:27.230000 audit[4684]: NETFILTER_CFG table=filter:125 family=2 entries=22 op=nft_register_rule pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:27.230000 audit[4684]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd7f316f80 a2=0 a3=7ffd7f316f6c items=0 ppid=2116 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:27.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:27.231000 audit[4684]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:27.231000 audit[4684]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd7f316f80 a2=0 a3=0 items=0 ppid=2116 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:27.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:27.259000 audit[4686]: NETFILTER_CFG table=filter:127 family=2 entries=34 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:27.259000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff16de4360 a2=0 a3=7fff16de434c items=0 ppid=2116 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:27.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:27.263000 audit[4686]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:27.263000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff16de4360 a2=0 a3=0 items=0 ppid=2116 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:27.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:27.542090 sshd[4626]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:27.546000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:27.546000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:27.561785 systemd[1]: Started sshd@17-172.24.4.96:22-172.24.4.1:58904.service. Apr 12 19:09:27.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.96:22-172.24.4.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:27.568425 systemd[1]: sshd@16-172.24.4.96:22-172.24.4.1:41718.service: Deactivated successfully. Apr 12 19:09:27.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.96:22-172.24.4.1:41718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:27.570739 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 19:09:27.578019 systemd-logind[1047]: Session 17 logged out. Waiting for processes to exit. Apr 12 19:09:27.580213 systemd-logind[1047]: Removed session 17. Apr 12 19:09:28.861000 audit[4688]: USER_ACCT pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:28.863390 sshd[4688]: Accepted publickey for core from 172.24.4.1 port 58904 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:28.864000 audit[4688]: CRED_ACQ pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:28.864000 audit[4688]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c306c40 a2=3 a3=0 items=0 ppid=1 pid=4688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:28.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:28.866144 sshd[4688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:28.878131 systemd[1]: Started session-18.scope. Apr 12 19:09:28.879117 systemd-logind[1047]: New session 18 of user core. Apr 12 19:09:28.891000 audit[4688]: USER_START pid=4688 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:28.894000 audit[4691]: CRED_ACQ pid=4691 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:28.942000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:28.942000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00216ce00 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:28.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:28.953000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:28.953000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00216ce20 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:28.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:28.967000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:28.967000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005768e0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:28.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:28.974000 audit[1828]: AVC avc: denied { watch } for pid=1828 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:09:28.974000 audit[1828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000576dc0 a2=fc6 a3=0 items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c192 key=(null) Apr 12 19:09:28.974000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:09:30.332342 systemd[1]: run-containerd-runc-k8s.io-011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405-runc.oBM9Y4.mount: Deactivated successfully. Apr 12 19:09:31.163368 sshd[4688]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:31.179161 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 19:09:31.179349 kernel: audit: type=1106 audit(1712948971.165:1534): pid=4688 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:31.165000 audit[4688]: USER_END pid=4688 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:31.169369 systemd[1]: Started sshd@18-172.24.4.96:22-172.24.4.1:58914.service. Apr 12 19:09:31.166000 audit[4688]: CRED_DISP pid=4688 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:31.185352 kernel: audit: type=1104 audit(1712948971.166:1535): pid=4688 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:31.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.96:22-172.24.4.1:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:31.190564 kernel: audit: type=1130 audit(1712948971.166:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.96:22-172.24.4.1:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:31.197738 systemd[1]: sshd@17-172.24.4.96:22-172.24.4.1:58904.service: Deactivated successfully. Apr 12 19:09:31.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.96:22-172.24.4.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:31.198610 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 19:09:31.198767 systemd[1]: session-18.scope: Consumed 1.032s CPU time. Apr 12 19:09:31.203107 systemd-logind[1047]: Session 18 logged out. Waiting for processes to exit. Apr 12 19:09:31.203430 kernel: audit: type=1131 audit(1712948971.196:1537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.96:22-172.24.4.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:31.205552 systemd-logind[1047]: Removed session 18. Apr 12 19:09:32.349554 systemd[1]: run-containerd-runc-k8s.io-20e9cc9a3cffe6aad4664436c00a1c8bc5343f19a06fc4bc60e355b38316b3ed-runc.iLvCSB.mount: Deactivated successfully. Apr 12 19:09:32.713000 audit[4745]: USER_ACCT pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.729141 sshd[4745]: Accepted publickey for core from 172.24.4.1 port 58914 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:32.729902 kernel: audit: type=1101 audit(1712948972.713:1538): pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.727000 audit[4745]: CRED_ACQ pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.742425 kernel: audit: type=1103 audit(1712948972.727:1539): pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.742991 sshd[4745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:32.727000 audit[4745]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce051d920 a2=3 a3=0 items=0 ppid=1 pid=4745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:32.764700 kernel: audit: type=1006 audit(1712948972.727:1540): pid=4745 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 19:09:32.764898 kernel: audit: type=1300 audit(1712948972.727:1540): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce051d920 a2=3 a3=0 items=0 ppid=1 pid=4745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:32.764979 kernel: audit: type=1327 audit(1712948972.727:1540): proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:32.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:32.763758 systemd[1]: Started session-19.scope. Apr 12 19:09:32.767757 systemd-logind[1047]: New session 19 of user core. Apr 12 19:09:32.780000 audit[4745]: USER_START pid=4745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.786000 audit[4763]: CRED_ACQ pid=4763 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:32.795384 kernel: audit: type=1105 audit(1712948972.780:1541): pid=4745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:33.513858 sshd[4745]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:33.513000 audit[4745]: USER_END pid=4745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:33.513000 audit[4745]: CRED_DISP pid=4745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:33.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.96:22-172.24.4.1:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:33.516815 systemd-logind[1047]: Session 19 logged out. Waiting for processes to exit. Apr 12 19:09:33.516969 systemd[1]: sshd@18-172.24.4.96:22-172.24.4.1:58914.service: Deactivated successfully. Apr 12 19:09:33.517790 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 19:09:33.518658 systemd-logind[1047]: Removed session 19. Apr 12 19:09:34.569151 update_engine[1048]: I0412 19:09:34.568367 1048 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:09:34.569151 update_engine[1048]: I0412 19:09:34.568776 1048 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:09:34.569151 update_engine[1048]: E0412 19:09:34.568969 1048 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:09:34.569151 update_engine[1048]: I0412 19:09:34.569096 1048 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 19:09:36.687000 audit[4780]: NETFILTER_CFG table=filter:129 family=2 entries=22 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:36.691234 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 19:09:36.691324 kernel: audit: type=1325 audit(1712948976.687:1546): table=filter:129 family=2 entries=22 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:36.687000 audit[4780]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd32137bb0 a2=0 a3=7ffd32137b9c items=0 ppid=2116 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:36.710100 kernel: audit: type=1300 audit(1712948976.687:1546): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd32137bb0 a2=0 a3=7ffd32137b9c items=0 ppid=2116 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:36.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:36.717229 kernel: audit: type=1327 audit(1712948976.687:1546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:36.721000 audit[4780]: NETFILTER_CFG table=nat:130 family=2 entries=104 op=nft_register_chain pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:36.731327 kernel: audit: type=1325 audit(1712948976.721:1547): table=nat:130 family=2 entries=104 op=nft_register_chain pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:36.731513 kernel: audit: type=1300 audit(1712948976.721:1547): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd32137bb0 a2=0 a3=7ffd32137b9c items=0 ppid=2116 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:36.721000 audit[4780]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd32137bb0 a2=0 a3=7ffd32137b9c items=0 ppid=2116 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:36.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:36.751675 kernel: audit: type=1327 audit(1712948976.721:1547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:38.524347 systemd[1]: Started sshd@19-172.24.4.96:22-172.24.4.1:51254.service. Apr 12 19:09:38.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.96:22-172.24.4.1:51254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:38.536296 kernel: audit: type=1130 audit(1712948978.524:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.96:22-172.24.4.1:51254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:39.903000 audit[4783]: USER_ACCT pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:39.912305 sshd[4783]: Accepted publickey for core from 172.24.4.1 port 51254 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:39.915544 sshd[4783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:39.917662 kernel: audit: type=1101 audit(1712948979.903:1549): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:39.909000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:39.937849 kernel: audit: type=1103 audit(1712948979.909:1550): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:39.938020 kernel: audit: type=1006 audit(1712948979.909:1551): pid=4783 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 19:09:39.909000 audit[4783]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc70fab0 a2=3 a3=0 items=0 ppid=1 pid=4783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:39.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:39.943841 systemd[1]: Started session-20.scope. Apr 12 19:09:39.944766 systemd-logind[1047]: New session 20 of user core. Apr 12 19:09:39.950000 audit[4783]: USER_START pid=4783 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:39.953000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:40.729024 sshd[4783]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:40.730000 audit[4783]: USER_END pid=4783 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:40.730000 audit[4783]: CRED_DISP pid=4783 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:40.735133 systemd[1]: sshd@19-172.24.4.96:22-172.24.4.1:51254.service: Deactivated successfully. Apr 12 19:09:40.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.96:22-172.24.4.1:51254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:40.737053 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 19:09:40.738607 systemd-logind[1047]: Session 20 logged out. Waiting for processes to exit. Apr 12 19:09:40.741431 systemd-logind[1047]: Removed session 20. Apr 12 19:09:43.850231 systemd[1]: run-containerd-runc-k8s.io-011dc2143b1200c3175426becf83f44ed4fe1f09883898bf7b295dd23e3c1405-runc.eMBw2r.mount: Deactivated successfully. Apr 12 19:09:44.568831 update_engine[1048]: I0412 19:09:44.568704 1048 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569136 1048 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:09:44.569684 update_engine[1048]: E0412 19:09:44.569382 1048 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569505 1048 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569519 1048 omaha_request_action.cc:621] Omaha request response: Apr 12 19:09:44.569684 update_engine[1048]: E0412 19:09:44.569656 1048 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569680 1048 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569689 1048 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:09:44.569684 update_engine[1048]: I0412 19:09:44.569696 1048 update_attempter.cc:306] Processing Done. Apr 12 19:09:44.570283 update_engine[1048]: E0412 19:09:44.569718 1048 update_attempter.cc:619] Update failed. Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569728 1048 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569736 1048 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569744 1048 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569907 1048 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569949 1048 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569957 1048 omaha_request_action.cc:271] Request: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.569965 1048 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:09:44.570283 update_engine[1048]: I0412 19:09:44.570174 1048 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:09:44.571498 update_engine[1048]: E0412 19:09:44.570348 1048 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570449 1048 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570461 1048 omaha_request_action.cc:621] Omaha request response: Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570470 1048 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570477 1048 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570483 1048 update_attempter.cc:306] Processing Done. Apr 12 19:09:44.571498 update_engine[1048]: I0412 19:09:44.570490 1048 update_attempter.cc:310] Error event sent. Apr 12 19:09:44.572000 locksmithd[1098]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 19:09:44.575979 update_engine[1048]: I0412 19:09:44.572883 1048 update_check_scheduler.cc:74] Next update check in 49m11s Apr 12 19:09:44.576621 locksmithd[1098]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 19:09:45.011719 systemd[1]: run-containerd-runc-k8s.io-71068baa7dfc092b2040999347a40476d759839fc35b15a16de84a03526cb5f2-runc.lN5EY7.mount: Deactivated successfully. Apr 12 19:09:45.055712 kubelet[1941]: I0412 19:09:45.055654 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68769dc6cc-8fk29" podStartSLOduration=23.133021134 podCreationTimestamp="2024-04-12 19:09:14 +0000 UTC" firstStartedPulling="2024-04-12 19:09:15.634316823 +0000 UTC m=+106.626623899" lastFinishedPulling="2024-04-12 19:09:23.555586682 +0000 UTC m=+114.547893778" observedRunningTime="2024-04-12 19:09:24.221354717 +0000 UTC m=+115.213661873" watchObservedRunningTime="2024-04-12 19:09:45.054291013 +0000 UTC m=+136.046598099" Apr 12 19:09:45.091316 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 19:09:45.091473 kernel: audit: type=1325 audit(1712948985.087:1557): table=filter:131 family=2 entries=9 op=nft_register_rule pid=4840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:45.087000 audit[4840]: NETFILTER_CFG table=filter:131 family=2 entries=9 op=nft_register_rule pid=4840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:45.087000 audit[4840]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4fbf77c0 a2=0 a3=7ffc4fbf77ac items=0 ppid=2116 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:45.099986 kernel: audit: type=1300 audit(1712948985.087:1557): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4fbf77c0 a2=0 a3=7ffc4fbf77ac items=0 ppid=2116 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:45.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:45.105286 kernel: audit: type=1327 audit(1712948985.087:1557): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:45.089000 audit[4840]: NETFILTER_CFG table=nat:132 family=2 entries=51 op=nft_register_chain pid=4840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:45.089000 audit[4840]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffc4fbf77c0 a2=0 a3=7ffc4fbf77ac items=0 ppid=2116 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:45.114893 kernel: audit: type=1325 audit(1712948985.089:1558): table=nat:132 family=2 entries=51 op=nft_register_chain pid=4840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:45.115013 kernel: audit: type=1300 audit(1712948985.089:1558): arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffc4fbf77c0 a2=0 a3=7ffc4fbf77ac items=0 ppid=2116 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:45.115056 kernel: audit: type=1327 audit(1712948985.089:1558): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:45.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:45.745756 systemd[1]: Started sshd@20-172.24.4.96:22-172.24.4.1:46474.service. Apr 12 19:09:45.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.96:22-172.24.4.1:46474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:45.758381 kernel: audit: type=1130 audit(1712948985.745:1559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.96:22-172.24.4.1:46474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:46.609000 audit[4845]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=4845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:46.614327 kernel: audit: type=1325 audit(1712948986.609:1560): table=filter:133 family=2 entries=8 op=nft_register_rule pid=4845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:46.614501 kernel: audit: type=1300 audit(1712948986.609:1560): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff0fc4b70 a2=0 a3=7ffff0fc4b5c items=0 ppid=2116 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:46.609000 audit[4845]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff0fc4b70 a2=0 a3=7ffff0fc4b5c items=0 ppid=2116 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:46.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:46.638298 kernel: audit: type=1327 audit(1712948986.609:1560): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:46.629000 audit[4845]: NETFILTER_CFG table=nat:134 family=2 entries=58 op=nft_register_chain pid=4845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:09:46.629000 audit[4845]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffff0fc4b70 a2=0 a3=7ffff0fc4b5c items=0 ppid=2116 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:46.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:09:47.005000 audit[4842]: USER_ACCT pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.008295 sshd[4842]: Accepted publickey for core from 172.24.4.1 port 46474 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:47.008000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.008000 audit[4842]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8b0fdfc0 a2=3 a3=0 items=0 ppid=1 pid=4842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:47.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:47.011455 sshd[4842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:47.021953 systemd-logind[1047]: New session 21 of user core. Apr 12 19:09:47.024074 systemd[1]: Started session-21.scope. Apr 12 19:09:47.035000 audit[4842]: USER_START pid=4842 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.038000 audit[4846]: CRED_ACQ pid=4846 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.773429 sshd[4842]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:47.774000 audit[4842]: USER_END pid=4842 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.774000 audit[4842]: CRED_DISP pid=4842 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:47.778947 systemd[1]: sshd@20-172.24.4.96:22-172.24.4.1:46474.service: Deactivated successfully. Apr 12 19:09:47.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.96:22-172.24.4.1:46474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:47.780993 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 19:09:47.782389 systemd-logind[1047]: Session 21 logged out. Waiting for processes to exit. Apr 12 19:09:47.784324 systemd-logind[1047]: Removed session 21. Apr 12 19:09:52.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.96:22-172.24.4.1:46486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:52.782112 systemd[1]: Started sshd@21-172.24.4.96:22-172.24.4.1:46486.service. Apr 12 19:09:52.785440 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 19:09:52.785516 kernel: audit: type=1130 audit(1712948992.781:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.96:22-172.24.4.1:46486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:54.167000 audit[4867]: USER_ACCT pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.169634 sshd[4867]: Accepted publickey for core from 172.24.4.1 port 46486 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:09:54.181387 kernel: audit: type=1101 audit(1712948994.167:1571): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.180000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.184427 sshd[4867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:09:54.200194 kernel: audit: type=1103 audit(1712948994.180:1572): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.200425 kernel: audit: type=1006 audit(1712948994.180:1573): pid=4867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 19:09:54.180000 audit[4867]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39cbc440 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:54.208429 systemd[1]: Started session-22.scope. Apr 12 19:09:54.212013 systemd-logind[1047]: New session 22 of user core. Apr 12 19:09:54.214354 kernel: audit: type=1300 audit(1712948994.180:1573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39cbc440 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:09:54.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:54.221333 kernel: audit: type=1327 audit(1712948994.180:1573): proctitle=737368643A20636F7265205B707269765D Apr 12 19:09:54.224000 audit[4867]: USER_START pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.238360 kernel: audit: type=1105 audit(1712948994.224:1574): pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.238521 kernel: audit: type=1103 audit(1712948994.228:1575): pid=4869 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.228000 audit[4869]: CRED_ACQ pid=4869 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.982777 sshd[4867]: pam_unix(sshd:session): session closed for user core Apr 12 19:09:54.984000 audit[4867]: USER_END pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.989501 systemd[1]: sshd@21-172.24.4.96:22-172.24.4.1:46486.service: Deactivated successfully. Apr 12 19:09:54.991193 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 19:09:54.999327 kernel: audit: type=1106 audit(1712948994.984:1576): pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:55.001591 kernel: audit: type=1104 audit(1712948994.985:1577): pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:54.985000 audit[4867]: CRED_DISP pid=4867 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:09:55.000690 systemd-logind[1047]: Session 22 logged out. Waiting for processes to exit. Apr 12 19:09:54.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.96:22-172.24.4.1:46486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:55.012091 systemd-logind[1047]: Removed session 22. Apr 12 19:09:59.992043 systemd[1]: Started sshd@22-172.24.4.96:22-172.24.4.1:38760.service. Apr 12 19:09:59.995561 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:09:59.995854 kernel: audit: type=1130 audit(1712948999.991:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.96:22-172.24.4.1:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:09:59.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.96:22-172.24.4.1:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:10:01.811000 audit[4891]: USER_ACCT pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.815814 sshd[4891]: Accepted publickey for core from 172.24.4.1 port 38760 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:10:01.825655 kernel: audit: type=1101 audit(1712949001.811:1580): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.826891 sshd[4891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:10:01.824000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.839306 kernel: audit: type=1103 audit(1712949001.824:1581): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.839856 kernel: audit: type=1006 audit(1712949001.824:1582): pid=4891 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 19:10:01.847338 kernel: audit: type=1300 audit(1712949001.824:1582): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec0829640 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:10:01.824000 audit[4891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec0829640 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:10:01.824000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:10:01.870315 systemd-logind[1047]: New session 23 of user core. Apr 12 19:10:01.874629 kernel: audit: type=1327 audit(1712949001.824:1582): proctitle=737368643A20636F7265205B707269765D Apr 12 19:10:01.873915 systemd[1]: Started session-23.scope. Apr 12 19:10:01.886000 audit[4891]: USER_START pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.909326 kernel: audit: type=1105 audit(1712949001.886:1583): pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.908000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:01.918304 kernel: audit: type=1103 audit(1712949001.908:1584): pid=4893 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:02.675980 sshd[4891]: pam_unix(sshd:session): session closed for user core Apr 12 19:10:02.676000 audit[4891]: USER_END pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:02.679152 systemd[1]: sshd@22-172.24.4.96:22-172.24.4.1:38760.service: Deactivated successfully. Apr 12 19:10:02.679947 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 19:10:02.676000 audit[4891]: CRED_DISP pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:02.686758 kernel: audit: type=1106 audit(1712949002.676:1585): pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:02.686843 kernel: audit: type=1104 audit(1712949002.676:1586): pid=4891 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:02.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.96:22-172.24.4.1:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:10:02.686920 systemd-logind[1047]: Session 23 logged out. Waiting for processes to exit. Apr 12 19:10:02.688026 systemd-logind[1047]: Removed session 23. Apr 12 19:10:07.689230 systemd[1]: Started sshd@23-172.24.4.96:22-172.24.4.1:59576.service. Apr 12 19:10:07.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.96:22-172.24.4.1:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:10:07.694180 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:10:07.694392 kernel: audit: type=1130 audit(1712949007.690:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.96:22-172.24.4.1:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:10:09.192000 audit[4931]: USER_ACCT pid=4931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.196820 sshd[4931]: Accepted publickey for core from 172.24.4.1 port 59576 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 19:10:09.205364 kernel: audit: type=1101 audit(1712949009.192:1589): pid=4931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.204000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.219854 sshd[4931]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:10:09.223398 kernel: audit: type=1103 audit(1712949009.204:1590): pid=4931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.224577 kernel: audit: type=1006 audit(1712949009.205:1591): pid=4931 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 19:10:09.205000 audit[4931]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63bf67c0 a2=3 a3=0 items=0 ppid=1 pid=4931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:10:09.237316 kernel: audit: type=1300 audit(1712949009.205:1591): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63bf67c0 a2=3 a3=0 items=0 ppid=1 pid=4931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:10:09.237518 kernel: audit: type=1327 audit(1712949009.205:1591): proctitle=737368643A20636F7265205B707269765D Apr 12 19:10:09.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:10:09.254513 systemd-logind[1047]: New session 24 of user core. Apr 12 19:10:09.256066 systemd[1]: Started session-24.scope. Apr 12 19:10:09.274000 audit[4931]: USER_START pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.289314 kernel: audit: type=1105 audit(1712949009.274:1592): pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.280000 audit[4933]: CRED_ACQ pid=4933 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:09.299295 kernel: audit: type=1103 audit(1712949009.280:1593): pid=4933 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:10.027424 sshd[4931]: pam_unix(sshd:session): session closed for user core Apr 12 19:10:10.030000 audit[4931]: USER_END pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:10.045324 kernel: audit: type=1106 audit(1712949010.030:1594): pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:10.045193 systemd[1]: sshd@23-172.24.4.96:22-172.24.4.1:59576.service: Deactivated successfully. Apr 12 19:10:10.030000 audit[4931]: CRED_DISP pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 19:10:10.047722 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 19:10:10.050197 systemd-logind[1047]: Session 24 logged out. Waiting for processes to exit. Apr 12 19:10:10.052429 systemd-logind[1047]: Removed session 24. Apr 12 19:10:10.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.96:22-172.24.4.1:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:10:10.057326 kernel: audit: type=1104 audit(1712949010.030:1595): pid=4931 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success'