Apr 12 18:50:39.009802 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:50:39.009841 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:50:39.009863 kernel: BIOS-provided physical RAM map: Apr 12 18:50:39.009876 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:50:39.009889 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:50:39.009901 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:50:39.009916 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Apr 12 18:50:39.009930 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Apr 12 18:50:39.009945 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:50:39.009957 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:50:39.009970 kernel: NX (Execute Disable) protection: active Apr 12 18:50:39.009982 kernel: SMBIOS 2.8 present. Apr 12 18:50:39.009994 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Apr 12 18:50:39.010007 kernel: Hypervisor detected: KVM Apr 12 18:50:39.010022 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:50:39.010039 kernel: kvm-clock: cpu 0, msr 2b191001, primary cpu clock Apr 12 18:50:39.010053 kernel: kvm-clock: using sched offset of 5570331284 cycles Apr 12 18:50:39.010067 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:50:39.010081 kernel: tsc: Detected 1996.249 MHz processor Apr 12 18:50:39.010096 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:50:39.010110 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:50:39.010124 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Apr 12 18:50:39.010138 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:50:39.010155 kernel: ACPI: Early table checksum verification disabled Apr 12 18:50:39.010169 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Apr 12 18:50:39.010183 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:50:39.010197 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:50:39.010210 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:50:39.010224 kernel: ACPI: FACS 0x000000007FFE0000 000040 Apr 12 18:50:39.010238 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:50:39.010252 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:50:39.010265 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Apr 12 18:50:39.010282 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Apr 12 18:50:39.010295 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Apr 12 18:50:39.010309 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Apr 12 18:50:39.010323 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Apr 12 18:50:39.010336 kernel: No NUMA configuration found Apr 12 18:50:39.010349 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Apr 12 18:50:39.010363 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Apr 12 18:50:39.010377 kernel: Zone ranges: Apr 12 18:50:39.010399 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:50:39.010413 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Apr 12 18:50:39.010427 kernel: Normal empty Apr 12 18:50:39.010441 kernel: Movable zone start for each node Apr 12 18:50:39.010455 kernel: Early memory node ranges Apr 12 18:50:39.010470 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:50:39.010487 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Apr 12 18:50:39.010501 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Apr 12 18:50:39.010515 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:50:39.010529 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:50:39.010543 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Apr 12 18:50:39.010557 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:50:39.010629 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:50:39.010645 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:50:39.010660 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:50:39.010674 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:50:39.010695 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:50:39.010709 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:50:39.010723 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:50:39.010738 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:50:39.010752 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:50:39.010766 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Apr 12 18:50:39.010781 kernel: Booting paravirtualized kernel on KVM Apr 12 18:50:39.010795 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:50:39.010810 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:50:39.010828 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:50:39.010842 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:50:39.010856 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:50:39.010870 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Apr 12 18:50:39.010884 kernel: kvm-guest: PV spinlocks disabled, no host support Apr 12 18:50:39.010899 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Apr 12 18:50:39.010913 kernel: Policy zone: DMA32 Apr 12 18:50:39.010930 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:50:39.010948 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:50:39.010962 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:50:39.010977 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:50:39.010991 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:50:39.011006 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 123076K reserved, 0K cma-reserved) Apr 12 18:50:39.011020 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:50:39.011035 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:50:39.011049 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:50:39.011067 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:50:39.011082 kernel: rcu: RCU event tracing is enabled. Apr 12 18:50:39.011097 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:50:39.011111 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:50:39.011126 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:50:39.011140 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:50:39.011154 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:50:39.011169 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:50:39.011183 kernel: Console: colour VGA+ 80x25 Apr 12 18:50:39.011201 kernel: printk: console [tty0] enabled Apr 12 18:50:39.011242 kernel: printk: console [ttyS0] enabled Apr 12 18:50:39.011257 kernel: ACPI: Core revision 20210730 Apr 12 18:50:39.011272 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:50:39.011286 kernel: x2apic enabled Apr 12 18:50:39.011300 kernel: Switched APIC routing to physical x2apic. Apr 12 18:50:39.011314 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:50:39.011329 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:50:39.011343 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Apr 12 18:50:39.011357 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Apr 12 18:50:39.011378 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Apr 12 18:50:39.011392 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:50:39.011406 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:50:39.011421 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:50:39.011435 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:50:39.011449 kernel: Speculative Store Bypass: Vulnerable Apr 12 18:50:39.011464 kernel: x86/fpu: x87 FPU will use FXSAVE Apr 12 18:50:39.011478 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:50:39.011492 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:50:39.011511 kernel: LSM: Security Framework initializing Apr 12 18:50:39.011525 kernel: SELinux: Initializing. Apr 12 18:50:39.011539 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:50:39.011553 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:50:39.011568 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Apr 12 18:50:39.011603 kernel: Performance Events: AMD PMU driver. Apr 12 18:50:39.011617 kernel: ... version: 0 Apr 12 18:50:39.011631 kernel: ... bit width: 48 Apr 12 18:50:39.011645 kernel: ... generic registers: 4 Apr 12 18:50:39.011673 kernel: ... value mask: 0000ffffffffffff Apr 12 18:50:39.011688 kernel: ... max period: 00007fffffffffff Apr 12 18:50:39.011703 kernel: ... fixed-purpose events: 0 Apr 12 18:50:39.011722 kernel: ... event mask: 000000000000000f Apr 12 18:50:39.011737 kernel: signal: max sigframe size: 1440 Apr 12 18:50:39.011751 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:50:39.011766 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:50:39.011782 kernel: x86: Booting SMP configuration: Apr 12 18:50:39.011799 kernel: .... node #0, CPUs: #1 Apr 12 18:50:39.011814 kernel: kvm-clock: cpu 1, msr 2b191041, secondary cpu clock Apr 12 18:50:39.011829 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Apr 12 18:50:39.011844 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:50:39.011859 kernel: smpboot: Max logical packages: 2 Apr 12 18:50:39.011873 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Apr 12 18:50:39.011888 kernel: devtmpfs: initialized Apr 12 18:50:39.011903 kernel: x86/mm: Memory block size: 128MB Apr 12 18:50:39.011918 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:50:39.011936 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:50:39.011950 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:50:39.011965 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:50:39.011980 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:50:39.011995 kernel: audit: type=2000 audit(1712947838.799:1): state=initialized audit_enabled=0 res=1 Apr 12 18:50:39.012010 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:50:39.012025 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:50:39.012040 kernel: cpuidle: using governor menu Apr 12 18:50:39.012055 kernel: ACPI: bus type PCI registered Apr 12 18:50:39.012073 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:50:39.012088 kernel: dca service started, version 1.12.1 Apr 12 18:50:39.012103 kernel: PCI: Using configuration type 1 for base access Apr 12 18:50:39.012118 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:50:39.012133 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:50:39.012148 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:50:39.012162 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:50:39.012177 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:50:39.012192 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:50:39.012210 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:50:39.012225 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:50:39.012240 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:50:39.012255 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:50:39.012269 kernel: ACPI: Interpreter enabled Apr 12 18:50:39.012284 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:50:39.012299 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:50:39.012314 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:50:39.012329 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:50:39.012347 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:50:39.012603 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:50:39.012771 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:50:39.012795 kernel: acpiphp: Slot [3] registered Apr 12 18:50:39.012810 kernel: acpiphp: Slot [4] registered Apr 12 18:50:39.012825 kernel: acpiphp: Slot [5] registered Apr 12 18:50:39.012840 kernel: acpiphp: Slot [6] registered Apr 12 18:50:39.012860 kernel: acpiphp: Slot [7] registered Apr 12 18:50:39.012875 kernel: acpiphp: Slot [8] registered Apr 12 18:50:39.012890 kernel: acpiphp: Slot [9] registered Apr 12 18:50:39.012905 kernel: acpiphp: Slot [10] registered Apr 12 18:50:39.012919 kernel: acpiphp: Slot [11] registered Apr 12 18:50:39.012934 kernel: acpiphp: Slot [12] registered Apr 12 18:50:39.012949 kernel: acpiphp: Slot [13] registered Apr 12 18:50:39.012963 kernel: acpiphp: Slot [14] registered Apr 12 18:50:39.012978 kernel: acpiphp: Slot [15] registered Apr 12 18:50:39.012993 kernel: acpiphp: Slot [16] registered Apr 12 18:50:39.013010 kernel: acpiphp: Slot [17] registered Apr 12 18:50:39.013025 kernel: acpiphp: Slot [18] registered Apr 12 18:50:39.013040 kernel: acpiphp: Slot [19] registered Apr 12 18:50:39.013054 kernel: acpiphp: Slot [20] registered Apr 12 18:50:39.013069 kernel: acpiphp: Slot [21] registered Apr 12 18:50:39.013084 kernel: acpiphp: Slot [22] registered Apr 12 18:50:39.013098 kernel: acpiphp: Slot [23] registered Apr 12 18:50:39.013113 kernel: acpiphp: Slot [24] registered Apr 12 18:50:39.013128 kernel: acpiphp: Slot [25] registered Apr 12 18:50:39.013145 kernel: acpiphp: Slot [26] registered Apr 12 18:50:39.013159 kernel: acpiphp: Slot [27] registered Apr 12 18:50:39.013174 kernel: acpiphp: Slot [28] registered Apr 12 18:50:39.013189 kernel: acpiphp: Slot [29] registered Apr 12 18:50:39.013204 kernel: acpiphp: Slot [30] registered Apr 12 18:50:39.013219 kernel: acpiphp: Slot [31] registered Apr 12 18:50:39.013234 kernel: PCI host bridge to bus 0000:00 Apr 12 18:50:39.013405 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:50:39.013545 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:50:39.017762 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:50:39.017906 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Apr 12 18:50:39.018061 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:50:39.018196 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:50:39.018372 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:50:39.018541 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:50:39.018782 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:50:39.018943 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Apr 12 18:50:39.019098 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:50:39.019272 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:50:39.019429 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:50:39.021631 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:50:39.021826 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:50:39.021991 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:50:39.022142 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:50:39.022311 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Apr 12 18:50:39.022468 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Apr 12 18:50:39.022738 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Apr 12 18:50:39.022899 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Apr 12 18:50:39.023062 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Apr 12 18:50:39.023214 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:50:39.023416 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:50:39.027602 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Apr 12 18:50:39.027764 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Apr 12 18:50:39.027869 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Apr 12 18:50:39.027961 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Apr 12 18:50:39.028075 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:50:39.028167 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:50:39.028256 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Apr 12 18:50:39.028339 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Apr 12 18:50:39.028430 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Apr 12 18:50:39.028512 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Apr 12 18:50:39.028617 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Apr 12 18:50:39.028714 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:50:39.028798 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Apr 12 18:50:39.028880 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Apr 12 18:50:39.028892 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:50:39.028900 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:50:39.028909 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:50:39.028917 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:50:39.028925 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:50:39.028938 kernel: iommu: Default domain type: Translated Apr 12 18:50:39.028946 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:50:39.029028 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:50:39.029110 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:50:39.029192 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:50:39.029203 kernel: vgaarb: loaded Apr 12 18:50:39.029212 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:50:39.029220 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:50:39.029228 kernel: PTP clock support registered Apr 12 18:50:39.029240 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:50:39.029248 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:50:39.029256 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:50:39.029264 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Apr 12 18:50:39.029272 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:50:39.029280 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:50:39.029288 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:50:39.029296 kernel: pnp: PnP ACPI init Apr 12 18:50:39.029379 kernel: pnp 00:03: [dma 2] Apr 12 18:50:39.029394 kernel: pnp: PnP ACPI: found 5 devices Apr 12 18:50:39.029403 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:50:39.029411 kernel: NET: Registered PF_INET protocol family Apr 12 18:50:39.029419 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:50:39.029427 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 18:50:39.029436 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:50:39.029444 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:50:39.029452 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 18:50:39.029463 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 18:50:39.029471 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:50:39.029479 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:50:39.029487 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:50:39.029495 kernel: NET: Registered PF_XDP protocol family Apr 12 18:50:39.029585 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:50:39.029665 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:50:39.029738 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:50:39.029810 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Apr 12 18:50:39.029888 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:50:39.029970 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:50:39.030055 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:50:39.030137 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:50:39.030149 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:50:39.030157 kernel: Initialise system trusted keyrings Apr 12 18:50:39.030166 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 18:50:39.030174 kernel: Key type asymmetric registered Apr 12 18:50:39.030187 kernel: Asymmetric key parser 'x509' registered Apr 12 18:50:39.030195 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:50:39.030203 kernel: io scheduler mq-deadline registered Apr 12 18:50:39.030211 kernel: io scheduler kyber registered Apr 12 18:50:39.030219 kernel: io scheduler bfq registered Apr 12 18:50:39.030226 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:50:39.030235 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Apr 12 18:50:39.030243 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:50:39.030251 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Apr 12 18:50:39.030263 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:50:39.030271 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:50:39.030280 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:50:39.030287 kernel: random: crng init done Apr 12 18:50:39.030296 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:50:39.030304 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:50:39.030312 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:50:39.030320 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:50:39.030412 kernel: rtc_cmos 00:04: RTC can wake from S4 Apr 12 18:50:39.030498 kernel: rtc_cmos 00:04: registered as rtc0 Apr 12 18:50:39.030602 kernel: rtc_cmos 00:04: setting system clock to 2024-04-12T18:50:38 UTC (1712947838) Apr 12 18:50:39.030684 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Apr 12 18:50:39.030696 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:50:39.030704 kernel: Segment Routing with IPv6 Apr 12 18:50:39.030712 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:50:39.030720 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:50:39.030728 kernel: Key type dns_resolver registered Apr 12 18:50:39.030739 kernel: IPI shorthand broadcast: enabled Apr 12 18:50:39.030748 kernel: sched_clock: Marking stable (700462539, 120814365)->(843839110, -22562206) Apr 12 18:50:39.030756 kernel: registered taskstats version 1 Apr 12 18:50:39.030763 kernel: Loading compiled-in X.509 certificates Apr 12 18:50:39.030772 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:50:39.030780 kernel: Key type .fscrypt registered Apr 12 18:50:39.030788 kernel: Key type fscrypt-provisioning registered Apr 12 18:50:39.030796 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:50:39.030807 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:50:39.030816 kernel: ima: No architecture policies found Apr 12 18:50:39.030824 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:50:39.030832 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:50:39.030840 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:50:39.030848 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:50:39.030856 kernel: Run /init as init process Apr 12 18:50:39.030864 kernel: with arguments: Apr 12 18:50:39.030872 kernel: /init Apr 12 18:50:39.030880 kernel: with environment: Apr 12 18:50:39.030889 kernel: HOME=/ Apr 12 18:50:39.030897 kernel: TERM=linux Apr 12 18:50:39.030905 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:50:39.030916 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:50:39.030927 systemd[1]: Detected virtualization kvm. Apr 12 18:50:39.030936 systemd[1]: Detected architecture x86-64. Apr 12 18:50:39.030945 systemd[1]: Running in initrd. Apr 12 18:50:39.030955 systemd[1]: No hostname configured, using default hostname. Apr 12 18:50:39.030964 systemd[1]: Hostname set to . Apr 12 18:50:39.030973 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:50:39.030982 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:50:39.030990 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:50:39.030999 systemd[1]: Reached target cryptsetup.target. Apr 12 18:50:39.031007 systemd[1]: Reached target paths.target. Apr 12 18:50:39.031016 systemd[1]: Reached target slices.target. Apr 12 18:50:39.031026 systemd[1]: Reached target swap.target. Apr 12 18:50:39.031035 systemd[1]: Reached target timers.target. Apr 12 18:50:39.031044 systemd[1]: Listening on iscsid.socket. Apr 12 18:50:39.031052 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:50:39.031061 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:50:39.031070 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:50:39.031079 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:50:39.031087 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:50:39.031098 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:50:39.031107 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:50:39.031115 systemd[1]: Reached target sockets.target. Apr 12 18:50:39.031124 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:50:39.031145 systemd[1]: Finished network-cleanup.service. Apr 12 18:50:39.031157 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:50:39.031168 systemd[1]: Starting systemd-journald.service... Apr 12 18:50:39.031177 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:50:39.031186 systemd[1]: Starting systemd-resolved.service... Apr 12 18:50:39.031195 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:50:39.031203 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:50:39.031212 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:50:39.031237 systemd-journald[184]: Journal started Apr 12 18:50:39.031282 systemd-journald[184]: Runtime Journal (/run/log/journal/4177532684fc47ddb07b1e27c57f61ff) is 4.9M, max 39.5M, 34.5M free. Apr 12 18:50:38.998313 systemd-modules-load[185]: Inserted module 'overlay' Apr 12 18:50:39.060145 systemd[1]: Started systemd-journald.service. Apr 12 18:50:39.060175 kernel: audit: type=1130 audit(1712947839.050:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.060196 kernel: audit: type=1130 audit(1712947839.051:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.042068 systemd-resolved[186]: Positive Trust Anchors: Apr 12 18:50:39.042079 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:50:39.072707 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:50:39.072733 kernel: audit: type=1130 audit(1712947839.067:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.072744 kernel: Bridge firewalling registered Apr 12 18:50:39.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.042115 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:50:39.044861 systemd-resolved[186]: Defaulting to hostname 'linux'. Apr 12 18:50:39.082712 kernel: audit: type=1130 audit(1712947839.075:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.052243 systemd[1]: Started systemd-resolved.service. Apr 12 18:50:39.071608 systemd-modules-load[185]: Inserted module 'br_netfilter' Apr 12 18:50:39.075977 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:50:39.079796 systemd[1]: Reached target nss-lookup.target. Apr 12 18:50:39.081031 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:50:39.082133 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:50:39.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.093868 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:50:39.099043 kernel: audit: type=1130 audit(1712947839.093:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.101907 kernel: SCSI subsystem initialized Apr 12 18:50:39.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.103659 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:50:39.107895 kernel: audit: type=1130 audit(1712947839.103:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.108273 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:50:39.120182 dracut-cmdline[203]: dracut-dracut-053 Apr 12 18:50:39.123310 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:50:39.128684 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:50:39.130006 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:50:39.133011 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:50:39.137763 systemd-modules-load[185]: Inserted module 'dm_multipath' Apr 12 18:50:39.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.140047 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:50:39.144606 kernel: audit: type=1130 audit(1712947839.139:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.145019 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:50:39.154863 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:50:39.158991 kernel: audit: type=1130 audit(1712947839.154:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.202623 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:50:39.222616 kernel: iscsi: registered transport (tcp) Apr 12 18:50:39.249061 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:50:39.249121 kernel: QLogic iSCSI HBA Driver Apr 12 18:50:39.302297 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:50:39.307717 kernel: audit: type=1130 audit(1712947839.302:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.303860 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:50:39.391681 kernel: raid6: sse2x4 gen() 10618 MB/s Apr 12 18:50:39.408658 kernel: raid6: sse2x4 xor() 4896 MB/s Apr 12 18:50:39.425669 kernel: raid6: sse2x2 gen() 13939 MB/s Apr 12 18:50:39.443020 kernel: raid6: sse2x2 xor() 8539 MB/s Apr 12 18:50:39.459671 kernel: raid6: sse2x1 gen() 10814 MB/s Apr 12 18:50:39.477349 kernel: raid6: sse2x1 xor() 6832 MB/s Apr 12 18:50:39.477435 kernel: raid6: using algorithm sse2x2 gen() 13939 MB/s Apr 12 18:50:39.477465 kernel: raid6: .... xor() 8539 MB/s, rmw enabled Apr 12 18:50:39.478161 kernel: raid6: using ssse3x2 recovery algorithm Apr 12 18:50:39.492668 kernel: xor: measuring software checksum speed Apr 12 18:50:39.495270 kernel: prefetch64-sse : 18381 MB/sec Apr 12 18:50:39.495328 kernel: generic_sse : 15697 MB/sec Apr 12 18:50:39.495355 kernel: xor: using function: prefetch64-sse (18381 MB/sec) Apr 12 18:50:39.610633 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:50:39.627930 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:50:39.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.629000 audit: BPF prog-id=7 op=LOAD Apr 12 18:50:39.629000 audit: BPF prog-id=8 op=LOAD Apr 12 18:50:39.632064 systemd[1]: Starting systemd-udevd.service... Apr 12 18:50:39.645829 systemd-udevd[385]: Using default interface naming scheme 'v252'. Apr 12 18:50:39.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.658495 systemd[1]: Started systemd-udevd.service. Apr 12 18:50:39.662460 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:50:39.678759 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Apr 12 18:50:39.728716 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:50:39.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.731894 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:50:39.790946 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:50:39.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:39.878821 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Apr 12 18:50:39.890866 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:50:39.890946 kernel: GPT:17805311 != 41943039 Apr 12 18:50:39.890960 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:50:39.891883 kernel: GPT:17805311 != 41943039 Apr 12 18:50:39.891926 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:50:39.891939 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:50:39.902593 kernel: libata version 3.00 loaded. Apr 12 18:50:39.908591 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:50:39.909950 kernel: scsi host0: ata_piix Apr 12 18:50:39.910114 kernel: scsi host1: ata_piix Apr 12 18:50:39.910230 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Apr 12 18:50:39.910244 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Apr 12 18:50:39.922604 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (438) Apr 12 18:50:39.932331 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:50:39.970066 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:50:39.974135 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:50:39.978045 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:50:39.982084 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:50:39.983434 systemd[1]: Starting disk-uuid.service... Apr 12 18:50:40.004603 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:50:40.004676 disk-uuid[460]: Primary Header is updated. Apr 12 18:50:40.004676 disk-uuid[460]: Secondary Entries is updated. Apr 12 18:50:40.004676 disk-uuid[460]: Secondary Header is updated. Apr 12 18:50:40.014603 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:50:41.027626 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:50:41.028559 disk-uuid[461]: The operation has completed successfully. Apr 12 18:50:41.088501 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:50:41.088813 systemd[1]: Finished disk-uuid.service. Apr 12 18:50:41.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.119950 systemd[1]: Starting verity-setup.service... Apr 12 18:50:41.140635 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Apr 12 18:50:41.221157 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:50:41.226816 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:50:41.231890 systemd[1]: Finished verity-setup.service. Apr 12 18:50:41.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.370676 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:50:41.370817 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:50:41.371486 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:50:41.372336 systemd[1]: Starting ignition-setup.service... Apr 12 18:50:41.373413 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:50:41.407806 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:50:41.407845 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:50:41.407858 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:50:41.433358 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:50:41.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.449030 systemd[1]: Finished ignition-setup.service. Apr 12 18:50:41.453719 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:50:41.552309 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:50:41.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.555000 audit: BPF prog-id=9 op=LOAD Apr 12 18:50:41.558976 systemd[1]: Starting systemd-networkd.service... Apr 12 18:50:41.594890 systemd-networkd[632]: lo: Link UP Apr 12 18:50:41.595677 systemd-networkd[632]: lo: Gained carrier Apr 12 18:50:41.597009 systemd-networkd[632]: Enumeration completed Apr 12 18:50:41.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.597631 systemd[1]: Started systemd-networkd.service. Apr 12 18:50:41.598184 systemd[1]: Reached target network.target. Apr 12 18:50:41.599490 systemd[1]: Starting iscsiuio.service... Apr 12 18:50:41.602974 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:50:41.606166 systemd-networkd[632]: eth0: Link UP Apr 12 18:50:41.606681 systemd-networkd[632]: eth0: Gained carrier Apr 12 18:50:41.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.612563 systemd[1]: Started iscsiuio.service. Apr 12 18:50:41.614154 systemd[1]: Starting iscsid.service... Apr 12 18:50:41.619688 iscsid[640]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:50:41.619688 iscsid[640]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:50:41.619688 iscsid[640]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:50:41.619688 iscsid[640]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:50:41.619688 iscsid[640]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:50:41.619688 iscsid[640]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:50:41.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.622599 systemd[1]: Started iscsid.service. Apr 12 18:50:41.624281 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:50:41.625902 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.50/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 18:50:41.645480 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:50:41.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.646605 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:50:41.647493 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:50:41.648938 systemd[1]: Reached target remote-fs.target. Apr 12 18:50:41.650820 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:50:41.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.661485 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:50:41.755770 systemd-resolved[186]: Detected conflict on linux IN A 172.24.4.50 Apr 12 18:50:41.755807 systemd-resolved[186]: Hostname conflict, changing published hostname from 'linux' to 'linux9'. Apr 12 18:50:41.829200 ignition[575]: Ignition 2.14.0 Apr 12 18:50:41.831019 ignition[575]: Stage: fetch-offline Apr 12 18:50:41.831813 ignition[575]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:41.831868 ignition[575]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:41.834343 ignition[575]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:41.834684 ignition[575]: parsed url from cmdline: "" Apr 12 18:50:41.834695 ignition[575]: no config URL provided Apr 12 18:50:41.834709 ignition[575]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:50:41.837989 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:50:41.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.834730 ignition[575]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:50:41.842267 systemd[1]: Starting ignition-fetch.service... Apr 12 18:50:41.834751 ignition[575]: failed to fetch config: resource requires networking Apr 12 18:50:41.835405 ignition[575]: Ignition finished successfully Apr 12 18:50:41.862866 ignition[655]: Ignition 2.14.0 Apr 12 18:50:41.862900 ignition[655]: Stage: fetch Apr 12 18:50:41.863143 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:41.863188 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:41.865426 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:41.865693 ignition[655]: parsed url from cmdline: "" Apr 12 18:50:41.865704 ignition[655]: no config URL provided Apr 12 18:50:41.865717 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:50:41.865738 ignition[655]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:50:41.872162 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Apr 12 18:50:41.872229 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Apr 12 18:50:41.872550 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Apr 12 18:50:42.080920 ignition[655]: GET result: OK Apr 12 18:50:42.081171 ignition[655]: parsing config with SHA512: 6376cad83a39c87c2df4d6f5afe8f86bfefeee8c2925ec3ffe6326b9a22b074cf541cb8e2c2d509542d76c298711f55d4802769924d3fa6c478978136e687408 Apr 12 18:50:42.195909 unknown[655]: fetched base config from "system" Apr 12 18:50:42.195942 unknown[655]: fetched base config from "system" Apr 12 18:50:42.197683 ignition[655]: fetch: fetch complete Apr 12 18:50:42.195957 unknown[655]: fetched user config from "openstack" Apr 12 18:50:42.197698 ignition[655]: fetch: fetch passed Apr 12 18:50:42.197789 ignition[655]: Ignition finished successfully Apr 12 18:50:42.203815 systemd[1]: Finished ignition-fetch.service. Apr 12 18:50:42.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.207190 systemd[1]: Starting ignition-kargs.service... Apr 12 18:50:42.230646 ignition[661]: Ignition 2.14.0 Apr 12 18:50:42.231467 ignition[661]: Stage: kargs Apr 12 18:50:42.232061 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:42.232743 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:42.235208 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:42.239560 ignition[661]: kargs: kargs passed Apr 12 18:50:42.239778 ignition[661]: Ignition finished successfully Apr 12 18:50:42.241994 systemd[1]: Finished ignition-kargs.service. Apr 12 18:50:42.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.245532 systemd[1]: Starting ignition-disks.service... Apr 12 18:50:42.261868 ignition[667]: Ignition 2.14.0 Apr 12 18:50:42.261895 ignition[667]: Stage: disks Apr 12 18:50:42.262150 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:42.262193 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:42.264643 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:42.268977 ignition[667]: disks: disks passed Apr 12 18:50:42.269120 ignition[667]: Ignition finished successfully Apr 12 18:50:42.270961 systemd[1]: Finished ignition-disks.service. Apr 12 18:50:42.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.271558 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:50:42.273145 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:50:42.274770 systemd[1]: Reached target local-fs.target. Apr 12 18:50:42.276357 systemd[1]: Reached target sysinit.target. Apr 12 18:50:42.277857 systemd[1]: Reached target basic.target. Apr 12 18:50:42.280262 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:50:42.304068 systemd-fsck[675]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:50:42.312181 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:50:42.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.313689 systemd[1]: Mounting sysroot.mount... Apr 12 18:50:42.327612 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:50:42.328459 systemd[1]: Mounted sysroot.mount. Apr 12 18:50:42.329549 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:50:42.333240 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:50:42.335675 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:50:42.337222 systemd[1]: Starting flatcar-openstack-hostname.service... Apr 12 18:50:42.338942 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:50:42.339014 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:50:42.342286 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:50:42.351388 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:50:42.356787 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:50:42.366721 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (682) Apr 12 18:50:42.378091 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:50:42.378147 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:50:42.378159 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:50:42.378179 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:50:42.389293 initrd-setup-root[705]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:50:42.397830 initrd-setup-root[719]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:50:42.402953 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:50:42.409393 initrd-setup-root[729]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:50:42.490556 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:50:42.494763 systemd[1]: Starting ignition-mount.service... Apr 12 18:50:42.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.497972 systemd[1]: Starting sysroot-boot.service... Apr 12 18:50:42.511863 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:50:42.512678 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:50:42.529038 ignition[750]: INFO : Ignition 2.14.0 Apr 12 18:50:42.529848 ignition[750]: INFO : Stage: mount Apr 12 18:50:42.531073 ignition[750]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:42.532111 ignition[750]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:42.533969 coreos-metadata[681]: Apr 12 18:50:42.533 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Apr 12 18:50:42.536597 ignition[750]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:42.539849 ignition[750]: INFO : mount: mount passed Apr 12 18:50:42.541018 ignition[750]: INFO : Ignition finished successfully Apr 12 18:50:42.542611 systemd[1]: Finished ignition-mount.service. Apr 12 18:50:42.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.545090 systemd[1]: Finished sysroot-boot.service. Apr 12 18:50:42.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.552637 coreos-metadata[681]: Apr 12 18:50:42.552 INFO Fetch successful Apr 12 18:50:42.553239 coreos-metadata[681]: Apr 12 18:50:42.553 INFO wrote hostname ci-3510-3-3-d-76b1f6eb3d.novalocal to /sysroot/etc/hostname Apr 12 18:50:42.557213 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Apr 12 18:50:42.557318 systemd[1]: Finished flatcar-openstack-hostname.service. Apr 12 18:50:42.558769 systemd[1]: Starting ignition-files.service... Apr 12 18:50:42.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.567442 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:50:42.577759 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Apr 12 18:50:42.580784 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:50:42.580808 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:50:42.580821 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:50:42.589144 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:50:42.608350 ignition[778]: INFO : Ignition 2.14.0 Apr 12 18:50:42.609862 ignition[778]: INFO : Stage: files Apr 12 18:50:42.611084 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:50:42.612550 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:50:42.616712 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:50:42.624679 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:50:42.625953 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:50:42.625953 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:50:42.635270 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:50:42.636653 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:50:42.639139 unknown[778]: wrote ssh authorized keys file for user: core Apr 12 18:50:42.640425 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:50:42.640425 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:50:42.640425 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:50:43.061068 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:50:43.388929 systemd-networkd[632]: eth0: Gained IPv6LL Apr 12 18:50:43.924172 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:50:43.927996 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:50:43.927996 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:50:43.927996 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:50:44.268330 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:50:44.727654 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:50:44.727654 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:50:44.732787 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:50:44.732787 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:50:45.379664 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:50:45.753635 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:50:45.758645 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:50:45.759492 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:50:46.590033 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:51:14.664194 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 18:51:14.668178 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:51:14.668178 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:51:14.668178 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:51:15.434980 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:52:20.753452 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 18:52:20.753452 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:20.759651 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:20.759651 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:52:20.958753 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:52:26.247952 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a2de71807eb4c41f4d70e5c47fac72ecf3c74984be6c08be0597fc58621baeeddc1b5cc6431ab007eee9bd0a98f8628dd21512b06daaeccfac5837e9792a98a7 Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:52:26.251621 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:52:26.274357 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(f): op(10): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(f): op(10): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(11): op(12): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(11): op(12): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Apr 12 18:52:26.274357 ignition[778]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:26.340848 kernel: kauditd_printk_skb: 27 callbacks suppressed Apr 12 18:52:26.340874 kernel: audit: type=1130 audit(1712947946.277:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.340892 kernel: audit: type=1130 audit(1712947946.301:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.340907 kernel: audit: type=1131 audit(1712947946.302:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.340923 kernel: audit: type=1130 audit(1712947946.316:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.272390 systemd[1]: Finished ignition-files.service. Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(17): [started] processing unit "prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(17): op(18): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(17): op(18): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(17): [finished] processing unit "prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:52:26.341913 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:26.341913 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:26.341913 ignition[778]: INFO : files: files passed Apr 12 18:52:26.341913 ignition[778]: INFO : Ignition finished successfully Apr 12 18:52:26.370637 kernel: audit: type=1130 audit(1712947946.357:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.370663 kernel: audit: type=1131 audit(1712947946.357:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.282086 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:52:26.292536 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:52:26.372489 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:52:26.293982 systemd[1]: Starting ignition-quench.service... Apr 12 18:52:26.300945 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:52:26.301097 systemd[1]: Finished ignition-quench.service. Apr 12 18:52:26.316263 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:52:26.317278 systemd[1]: Reached target ignition-complete.target. Apr 12 18:52:26.327537 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:52:26.356985 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:52:26.357082 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:52:26.358189 systemd[1]: Reached target initrd-fs.target. Apr 12 18:52:26.367133 systemd[1]: Reached target initrd.target. Apr 12 18:52:26.368403 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:52:26.369176 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:52:26.387266 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:52:26.391713 kernel: audit: type=1130 audit(1712947946.387:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.392151 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:52:26.402530 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:52:26.403751 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:52:26.404917 systemd[1]: Stopped target timers.target. Apr 12 18:52:26.405977 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:52:26.406114 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:52:26.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.407893 systemd[1]: Stopped target initrd.target. Apr 12 18:52:26.412217 kernel: audit: type=1131 audit(1712947946.407:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.411877 systemd[1]: Stopped target basic.target. Apr 12 18:52:26.412779 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:52:26.413711 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:52:26.414673 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:52:26.415652 systemd[1]: Stopped target remote-fs.target. Apr 12 18:52:26.416782 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:52:26.417852 systemd[1]: Stopped target sysinit.target. Apr 12 18:52:26.418733 systemd[1]: Stopped target local-fs.target. Apr 12 18:52:26.419621 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:52:26.420548 systemd[1]: Stopped target swap.target. Apr 12 18:52:26.421437 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:52:26.426184 kernel: audit: type=1131 audit(1712947946.421:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.421628 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:52:26.422488 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:52:26.431440 kernel: audit: type=1131 audit(1712947946.427:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.426720 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:52:26.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.426877 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:52:26.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.427792 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:52:26.427951 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:52:26.432109 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:52:26.439603 iscsid[640]: iscsid shutting down. Apr 12 18:52:26.432262 systemd[1]: Stopped ignition-files.service. Apr 12 18:52:26.433950 systemd[1]: Stopping ignition-mount.service... Apr 12 18:52:26.449159 ignition[816]: INFO : Ignition 2.14.0 Apr 12 18:52:26.449159 ignition[816]: INFO : Stage: umount Apr 12 18:52:26.449159 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:26.449159 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:52:26.434784 systemd[1]: Stopping iscsid.service... Apr 12 18:52:26.452659 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:52:26.452659 ignition[816]: INFO : umount: umount passed Apr 12 18:52:26.452659 ignition[816]: INFO : Ignition finished successfully Apr 12 18:52:26.443436 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:52:26.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.454840 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:52:26.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.455029 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:52:26.455939 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:52:26.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.456061 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:52:26.458532 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:52:26.458694 systemd[1]: Stopped iscsid.service. Apr 12 18:52:26.460932 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:52:26.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.461066 systemd[1]: Stopped ignition-mount.service. Apr 12 18:52:26.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.462636 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:52:26.462735 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:52:26.465585 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:52:26.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.465644 systemd[1]: Stopped ignition-disks.service. Apr 12 18:52:26.467207 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:52:26.467248 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:52:26.468093 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:52:26.468133 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:52:26.471310 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:52:26.471366 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:52:26.471871 systemd[1]: Stopped target paths.target. Apr 12 18:52:26.472279 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:52:26.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.475826 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:52:26.476528 systemd[1]: Stopped target slices.target. Apr 12 18:52:26.476964 systemd[1]: Stopped target sockets.target. Apr 12 18:52:26.477405 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:52:26.477440 systemd[1]: Closed iscsid.socket. Apr 12 18:52:26.477916 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:52:26.477956 systemd[1]: Stopped ignition-setup.service. Apr 12 18:52:26.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.479831 systemd[1]: Stopping iscsiuio.service... Apr 12 18:52:26.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.483435 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:52:26.483883 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:52:26.483968 systemd[1]: Stopped iscsiuio.service. Apr 12 18:52:26.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.484955 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:52:26.485032 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:52:26.485794 systemd[1]: Stopped target network.target. Apr 12 18:52:26.486546 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:52:26.486598 systemd[1]: Closed iscsiuio.socket. Apr 12 18:52:26.487453 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:52:26.487490 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:52:26.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.488479 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:52:26.489713 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:52:26.492621 systemd-networkd[632]: eth0: DHCPv6 lease lost Apr 12 18:52:26.497000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:52:26.493513 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:52:26.493671 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:52:26.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.496162 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:52:26.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.496217 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:52:26.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.497769 systemd[1]: Stopping network-cleanup.service... Apr 12 18:52:26.499905 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:52:26.499965 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:52:26.501330 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:52:26.501391 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:52:26.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.502334 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:52:26.502374 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:52:26.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.503386 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:52:26.505141 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:52:26.514000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:52:26.505656 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:52:26.505742 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:52:26.509206 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:52:26.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.509353 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:52:26.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.515373 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:52:26.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.515413 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:52:26.517827 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:52:26.517865 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:52:26.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.518767 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:52:26.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.518806 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:52:26.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.519727 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:52:26.519764 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:52:26.520630 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:52:26.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.520666 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:52:26.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:26.522184 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:52:26.528993 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:52:26.529044 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:52:26.530375 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:52:26.530413 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:52:26.531078 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:52:26.531129 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:52:26.533069 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:52:26.533556 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:52:26.533662 systemd[1]: Stopped network-cleanup.service. Apr 12 18:52:26.534293 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:52:26.534371 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:52:26.535229 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:52:26.536651 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:52:26.556922 systemd[1]: Switching root. Apr 12 18:52:26.574506 systemd-journald[184]: Journal stopped Apr 12 18:52:31.113719 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Apr 12 18:52:31.113825 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:52:31.113859 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:52:31.113886 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:52:31.113921 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:52:31.113948 kernel: SELinux: policy capability open_perms=1 Apr 12 18:52:31.113981 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:52:31.114008 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:52:31.114038 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:52:31.114072 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:52:31.114099 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:52:31.114125 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:52:31.114153 systemd[1]: Successfully loaded SELinux policy in 91.221ms. Apr 12 18:52:31.114196 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.103ms. Apr 12 18:52:31.114230 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:52:31.114259 systemd[1]: Detected virtualization kvm. Apr 12 18:52:31.114291 systemd[1]: Detected architecture x86-64. Apr 12 18:52:31.114319 systemd[1]: Detected first boot. Apr 12 18:52:31.114348 systemd[1]: Hostname set to . Apr 12 18:52:31.114378 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:52:31.114405 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:52:31.114432 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:52:31.114462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:52:31.114493 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:52:31.114528 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:52:31.114559 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:52:31.114630 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:52:31.114660 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:52:31.114690 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:52:31.114719 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:52:31.114755 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:52:31.114784 systemd[1]: Created slice system-getty.slice. Apr 12 18:52:31.114813 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:52:31.114843 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:52:31.114872 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:52:31.114909 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:52:31.114938 systemd[1]: Created slice user.slice. Apr 12 18:52:31.114966 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:52:31.114994 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:52:31.115026 systemd[1]: Set up automount boot.automount. Apr 12 18:52:31.115055 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:52:31.115082 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:52:31.115133 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:52:31.115172 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:52:31.115201 systemd[1]: Reached target integritysetup.target. Apr 12 18:52:31.115229 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:52:31.115266 systemd[1]: Reached target remote-fs.target. Apr 12 18:52:31.115295 systemd[1]: Reached target slices.target. Apr 12 18:52:31.115323 systemd[1]: Reached target swap.target. Apr 12 18:52:31.115350 systemd[1]: Reached target torcx.target. Apr 12 18:52:31.115379 systemd[1]: Reached target veritysetup.target. Apr 12 18:52:31.115408 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:52:31.115435 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:52:31.115463 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:52:31.115491 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:52:31.115522 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:52:31.115550 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:52:31.115606 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:52:31.115642 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:52:31.115671 systemd[1]: Mounting media.mount... Apr 12 18:52:31.115699 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:52:31.115728 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:52:31.115756 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:52:31.115784 systemd[1]: Mounting tmp.mount... Apr 12 18:52:31.115817 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:52:31.115847 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:52:31.115876 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:52:31.115905 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:52:31.115933 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:52:31.115962 systemd[1]: Starting modprobe@drm.service... Apr 12 18:52:31.115992 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:52:31.116020 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:52:31.116047 systemd[1]: Starting modprobe@loop.service... Apr 12 18:52:31.116080 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:52:31.116111 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:52:31.116138 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:52:31.116166 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:52:31.116194 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:52:31.116221 systemd[1]: Stopped systemd-journald.service. Apr 12 18:52:31.116250 systemd[1]: Starting systemd-journald.service... Apr 12 18:52:31.116278 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:52:31.116305 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:52:31.116336 kernel: loop: module loaded Apr 12 18:52:31.116363 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:52:31.116392 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:52:31.116420 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:52:31.116447 systemd[1]: Stopped verity-setup.service. Apr 12 18:52:31.116476 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:52:31.116504 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:52:31.116532 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:52:31.116560 systemd[1]: Mounted media.mount. Apr 12 18:52:31.116642 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:52:31.116680 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:52:31.116709 systemd[1]: Mounted tmp.mount. Apr 12 18:52:31.116738 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:52:31.116767 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:52:31.116796 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:52:31.116824 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:52:31.116852 systemd[1]: Finished modprobe@drm.service. Apr 12 18:52:31.116881 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:52:31.116914 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:52:31.116942 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:52:31.116970 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:52:31.117000 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:52:31.117028 systemd[1]: Finished modprobe@loop.service. Apr 12 18:52:31.117060 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:52:31.117089 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:52:31.117118 systemd[1]: Reached target network-pre.target. Apr 12 18:52:31.117147 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:52:31.117176 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:52:31.117203 kernel: fuse: init (API version 7.34) Apr 12 18:52:31.117235 systemd-journald[911]: Journal started Apr 12 18:52:31.117328 systemd-journald[911]: Runtime Journal (/run/log/journal/4177532684fc47ddb07b1e27c57f61ff) is 4.9M, max 39.5M, 34.5M free. Apr 12 18:52:26.848000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:52:26.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:52:26.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:52:26.963000 audit: BPF prog-id=10 op=LOAD Apr 12 18:52:26.963000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:52:26.963000 audit: BPF prog-id=11 op=LOAD Apr 12 18:52:26.963000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:52:27.441000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:52:27.441000 audit[849]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:27.441000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:52:27.445000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:52:27.445000 audit[849]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:27.445000 audit: CWD cwd="/" Apr 12 18:52:27.445000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:27.445000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:27.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:52:30.753000 audit: BPF prog-id=12 op=LOAD Apr 12 18:52:30.754000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:52:30.754000 audit: BPF prog-id=13 op=LOAD Apr 12 18:52:30.754000 audit: BPF prog-id=14 op=LOAD Apr 12 18:52:30.754000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:52:30.754000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:52:30.755000 audit: BPF prog-id=15 op=LOAD Apr 12 18:52:30.755000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:52:30.755000 audit: BPF prog-id=16 op=LOAD Apr 12 18:52:30.755000 audit: BPF prog-id=17 op=LOAD Apr 12 18:52:30.755000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:52:30.755000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:52:30.756000 audit: BPF prog-id=18 op=LOAD Apr 12 18:52:30.756000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:52:30.756000 audit: BPF prog-id=19 op=LOAD Apr 12 18:52:30.756000 audit: BPF prog-id=20 op=LOAD Apr 12 18:52:30.756000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:52:30.756000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:52:30.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.767000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:52:30.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:30.930000 audit: BPF prog-id=21 op=LOAD Apr 12 18:52:30.930000 audit: BPF prog-id=22 op=LOAD Apr 12 18:52:30.930000 audit: BPF prog-id=23 op=LOAD Apr 12 18:52:30.930000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:52:30.930000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:52:31.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.110000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:52:31.110000 audit[911]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe794168e0 a2=4000 a3=7ffe7941697c items=0 ppid=1 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:31.110000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:52:27.432429 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:52:30.752211 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:52:27.433524 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:52:30.752226 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:52:27.433619 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:52:30.757729 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:52:27.433701 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:52:31.124666 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:52:27.433729 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:52:27.433799 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:52:27.433832 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:52:27.434263 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:52:27.434367 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:52:27.434402 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:52:27.438936 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:52:27.439025 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:52:27.439073 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:52:27.439141 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:52:27.439187 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:52:27.439225 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:52:30.326866 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:30.327157 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:30.327272 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:30.327478 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:30.327538 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:52:30.327641 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-04-12T18:52:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:52:31.132807 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:52:31.132886 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:52:31.138642 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:52:31.141618 systemd[1]: Started systemd-journald.service. Apr 12 18:52:31.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.142845 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:52:31.143008 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:52:31.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.143672 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:52:31.145941 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:52:31.147969 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:52:31.151911 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:52:31.224495 systemd-journald[911]: Time spent on flushing to /var/log/journal/4177532684fc47ddb07b1e27c57f61ff is 84.415ms for 1139 entries. Apr 12 18:52:31.224495 systemd-journald[911]: System Journal (/var/log/journal/4177532684fc47ddb07b1e27c57f61ff) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:52:31.387476 systemd-journald[911]: Received client request to flush runtime journal. Apr 12 18:52:31.387549 kernel: kauditd_printk_skb: 102 callbacks suppressed Apr 12 18:52:31.387607 kernel: audit: type=1130 audit(1712947951.315:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.387856 kernel: audit: type=1130 audit(1712947951.326:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.387892 kernel: audit: type=1130 audit(1712947951.357:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.257062 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:52:31.261802 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:52:31.263773 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:52:31.389074 udevadm[944]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:52:31.269544 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:52:31.315681 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:52:31.326177 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:52:31.331126 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:52:31.357063 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:52:31.394755 kernel: audit: type=1130 audit(1712947951.389:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.358939 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:52:31.389194 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:52:31.413706 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:52:31.419503 kernel: audit: type=1130 audit(1712947951.413:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.418233 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:52:31.452375 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:52:31.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:31.457596 kernel: audit: type=1130 audit(1712947951.452:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.028466 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:52:32.039072 kernel: audit: type=1130 audit(1712947952.029:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.038000 audit: BPF prog-id=24 op=LOAD Apr 12 18:52:32.041872 systemd[1]: Starting systemd-udevd.service... Apr 12 18:52:32.043664 kernel: audit: type=1334 audit(1712947952.038:148): prog-id=24 op=LOAD Apr 12 18:52:32.039000 audit: BPF prog-id=25 op=LOAD Apr 12 18:52:32.039000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:52:32.039000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:52:32.046815 kernel: audit: type=1334 audit(1712947952.039:149): prog-id=25 op=LOAD Apr 12 18:52:32.046908 kernel: audit: type=1334 audit(1712947952.039:150): prog-id=7 op=UNLOAD Apr 12 18:52:32.085670 systemd-udevd[962]: Using default interface naming scheme 'v252'. Apr 12 18:52:32.143308 systemd[1]: Started systemd-udevd.service. Apr 12 18:52:32.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.150000 audit: BPF prog-id=26 op=LOAD Apr 12 18:52:32.153973 systemd[1]: Starting systemd-networkd.service... Apr 12 18:52:32.166000 audit: BPF prog-id=27 op=LOAD Apr 12 18:52:32.167000 audit: BPF prog-id=28 op=LOAD Apr 12 18:52:32.168000 audit: BPF prog-id=29 op=LOAD Apr 12 18:52:32.170866 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:52:32.190462 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:52:32.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.274015 systemd[1]: Started systemd-userdbd.service. Apr 12 18:52:32.283701 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:52:32.358609 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:52:32.362606 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:52:32.361000 audit[972]: AVC avc: denied { confidentiality } for pid=972 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:52:32.361000 audit[972]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56464d116ee0 a1=32194 a2=7ff49b66ebc5 a3=5 items=108 ppid=962 pid=972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:32.361000 audit: CWD cwd="/" Apr 12 18:52:32.361000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=1 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=2 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=3 name=(null) inode=13028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=4 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=5 name=(null) inode=13029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=6 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=7 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=8 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=9 name=(null) inode=13031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=10 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=11 name=(null) inode=13032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=12 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=13 name=(null) inode=13033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=14 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=15 name=(null) inode=13034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=16 name=(null) inode=13030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=17 name=(null) inode=13035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=18 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=19 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=20 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=21 name=(null) inode=13037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=22 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=23 name=(null) inode=13038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=24 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=25 name=(null) inode=13039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=26 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=27 name=(null) inode=13040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=28 name=(null) inode=13036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=29 name=(null) inode=13041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=30 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=31 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=32 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=33 name=(null) inode=13043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=34 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=35 name=(null) inode=13044 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=36 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=37 name=(null) inode=13045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=38 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=39 name=(null) inode=13046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=40 name=(null) inode=13042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=41 name=(null) inode=13047 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=42 name=(null) inode=13027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=43 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=44 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=45 name=(null) inode=13049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=46 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=47 name=(null) inode=13050 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=48 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=49 name=(null) inode=13051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=50 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=51 name=(null) inode=13052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=52 name=(null) inode=13048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=53 name=(null) inode=13053 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=55 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=56 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=57 name=(null) inode=13055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=58 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=59 name=(null) inode=13056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=60 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=61 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=62 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=63 name=(null) inode=13058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=64 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=65 name=(null) inode=13059 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=66 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=67 name=(null) inode=13060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=68 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=69 name=(null) inode=13061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=70 name=(null) inode=13057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=71 name=(null) inode=13062 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=72 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=73 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=74 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=75 name=(null) inode=13064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=76 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=77 name=(null) inode=13065 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=78 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=79 name=(null) inode=13066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=80 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=81 name=(null) inode=13067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=82 name=(null) inode=13063 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=83 name=(null) inode=13068 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=84 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=85 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=86 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=87 name=(null) inode=13070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=88 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=89 name=(null) inode=13071 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=90 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=91 name=(null) inode=13072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=92 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=93 name=(null) inode=13073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=94 name=(null) inode=13069 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=95 name=(null) inode=13074 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=96 name=(null) inode=13054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=97 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=98 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=99 name=(null) inode=13076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=100 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=101 name=(null) inode=13077 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=102 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=103 name=(null) inode=13078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=104 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=105 name=(null) inode=13079 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=106 name=(null) inode=13075 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PATH item=107 name=(null) inode=13080 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:32.361000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:52:32.416591 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:52:32.440597 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:52:32.459586 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:52:32.521559 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:52:32.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.525648 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:52:32.565270 systemd-networkd[978]: lo: Link UP Apr 12 18:52:32.566039 systemd-networkd[978]: lo: Gained carrier Apr 12 18:52:32.567282 systemd-networkd[978]: Enumeration completed Apr 12 18:52:32.567692 systemd[1]: Started systemd-networkd.service. Apr 12 18:52:32.567916 systemd-networkd[978]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:52:32.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.573730 systemd-networkd[978]: eth0: Link UP Apr 12 18:52:32.573927 systemd-networkd[978]: eth0: Gained carrier Apr 12 18:52:32.576592 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:52:32.590834 systemd-networkd[978]: eth0: DHCPv4 address 172.24.4.50/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 18:52:32.623805 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:52:32.625101 systemd[1]: Reached target cryptsetup.target. Apr 12 18:52:32.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.628310 systemd[1]: Starting lvm2-activation.service... Apr 12 18:52:32.638767 lvm[992]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:52:32.677460 systemd[1]: Finished lvm2-activation.service. Apr 12 18:52:32.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:32.678751 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:52:32.679905 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:52:32.679964 systemd[1]: Reached target local-fs.target. Apr 12 18:52:32.680981 systemd[1]: Reached target machines.target. Apr 12 18:52:32.684152 systemd[1]: Starting ldconfig.service... Apr 12 18:52:32.686496 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:52:32.686646 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:32.689287 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:52:32.694262 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:52:32.698863 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:52:32.700395 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:52:32.700492 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:52:32.704891 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:52:32.730977 systemd[1]: boot.automount: Got automount request for /boot, triggered by 994 (bootctl) Apr 12 18:52:32.733726 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:52:32.803653 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:52:32.850278 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:52:32.854270 systemd-tmpfiles[997]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:52:32.865771 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:52:32.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.134413 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:52:33.135716 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:52:33.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.363120 systemd-fsck[1004]: fsck.fat 4.2 (2021-01-31) Apr 12 18:52:33.363120 systemd-fsck[1004]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:52:33.368155 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:52:33.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.373771 systemd[1]: Mounting boot.mount... Apr 12 18:52:33.409411 systemd[1]: Mounted boot.mount. Apr 12 18:52:33.458527 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:52:33.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.631704 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:52:33.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.633882 systemd[1]: Starting audit-rules.service... Apr 12 18:52:33.635475 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:52:33.638754 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:52:33.643000 audit: BPF prog-id=30 op=LOAD Apr 12 18:52:33.645936 systemd[1]: Starting systemd-resolved.service... Apr 12 18:52:33.651000 audit: BPF prog-id=31 op=LOAD Apr 12 18:52:33.653033 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:52:33.655026 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:52:33.656940 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:52:33.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.658060 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:52:33.668000 audit[1012]: SYSTEM_BOOT pid=1012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.671746 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:52:33.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.716601 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:52:33.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:33.754000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:52:33.754000 audit[1027]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4dd7f590 a2=420 a3=0 items=0 ppid=1007 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:33.754000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:52:33.755106 augenrules[1027]: No rules Apr 12 18:52:33.756318 systemd[1]: Finished audit-rules.service. Apr 12 18:52:33.764146 systemd-resolved[1010]: Positive Trust Anchors: Apr 12 18:52:33.764162 systemd-resolved[1010]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:52:33.764198 systemd-resolved[1010]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:52:33.769610 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:52:33.770184 systemd[1]: Reached target time-set.target. Apr 12 18:52:33.777709 systemd-resolved[1010]: Using system hostname 'ci-3510-3-3-d-76b1f6eb3d.novalocal'. Apr 12 18:52:33.780203 systemd[1]: Started systemd-resolved.service. Apr 12 18:52:33.780794 systemd[1]: Reached target network.target. Apr 12 18:52:33.781324 systemd[1]: Reached target nss-lookup.target. Apr 12 18:52:34.744096 systemd-timesyncd[1011]: Contacted time server 146.59.35.38:123 (0.flatcar.pool.ntp.org). Apr 12 18:52:34.744108 systemd-resolved[1010]: Clock change detected. Flushing caches. Apr 12 18:52:34.745298 systemd-timesyncd[1011]: Initial clock synchronization to Fri 2024-04-12 18:52:34.743885 UTC. Apr 12 18:52:34.861073 ldconfig[993]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:52:34.889992 systemd[1]: Finished ldconfig.service. Apr 12 18:52:34.894571 systemd[1]: Starting systemd-update-done.service... Apr 12 18:52:34.908372 systemd[1]: Finished systemd-update-done.service. Apr 12 18:52:34.909702 systemd[1]: Reached target sysinit.target. Apr 12 18:52:34.911040 systemd[1]: Started motdgen.path. Apr 12 18:52:34.912167 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:52:34.913992 systemd[1]: Started logrotate.timer. Apr 12 18:52:34.915262 systemd[1]: Started mdadm.timer. Apr 12 18:52:34.916279 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:52:34.917554 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:52:34.917635 systemd[1]: Reached target paths.target. Apr 12 18:52:34.918739 systemd[1]: Reached target timers.target. Apr 12 18:52:34.921752 systemd[1]: Listening on dbus.socket. Apr 12 18:52:34.925573 systemd[1]: Starting docker.socket... Apr 12 18:52:34.933667 systemd[1]: Listening on sshd.socket. Apr 12 18:52:34.935085 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:34.936068 systemd[1]: Listening on docker.socket. Apr 12 18:52:34.937537 systemd[1]: Reached target sockets.target. Apr 12 18:52:34.938634 systemd[1]: Reached target basic.target. Apr 12 18:52:34.939763 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:52:34.939834 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:52:34.942134 systemd[1]: Starting containerd.service... Apr 12 18:52:34.945622 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:52:34.950968 systemd[1]: Starting dbus.service... Apr 12 18:52:34.956146 systemd-networkd[978]: eth0: Gained IPv6LL Apr 12 18:52:34.959507 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:52:34.964514 systemd[1]: Starting extend-filesystems.service... Apr 12 18:52:34.969459 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:52:34.974287 systemd[1]: Starting motdgen.service... Apr 12 18:52:34.982391 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:52:34.984627 systemd[1]: Starting prepare-critools.service... Apr 12 18:52:34.986334 systemd[1]: Starting prepare-helm.service... Apr 12 18:52:34.988156 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:52:34.990259 systemd[1]: Starting sshd-keygen.service... Apr 12 18:52:34.994342 systemd[1]: Starting systemd-logind.service... Apr 12 18:52:34.997019 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:34.997095 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:52:34.997947 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:52:34.998851 systemd[1]: Starting update-engine.service... Apr 12 18:52:35.003086 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:52:35.005788 jq[1041]: false Apr 12 18:52:35.018412 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:52:35.018640 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:52:35.019353 jq[1051]: true Apr 12 18:52:35.020364 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:52:35.020525 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:52:35.046096 tar[1059]: ./ Apr 12 18:52:35.046096 tar[1059]: ./loopback Apr 12 18:52:35.047670 tar[1060]: crictl Apr 12 18:52:35.054508 tar[1061]: linux-amd64/helm Apr 12 18:52:35.059042 extend-filesystems[1042]: Found vda Apr 12 18:52:35.064476 extend-filesystems[1042]: Found vda1 Apr 12 18:52:35.065488 jq[1062]: true Apr 12 18:52:35.066565 extend-filesystems[1042]: Found vda2 Apr 12 18:52:35.067256 extend-filesystems[1042]: Found vda3 Apr 12 18:52:35.069180 extend-filesystems[1042]: Found usr Apr 12 18:52:35.070143 dbus-daemon[1040]: [system] SELinux support is enabled Apr 12 18:52:35.070356 systemd[1]: Started dbus.service. Apr 12 18:52:35.071080 extend-filesystems[1042]: Found vda4 Apr 12 18:52:35.071080 extend-filesystems[1042]: Found vda6 Apr 12 18:52:35.071080 extend-filesystems[1042]: Found vda7 Apr 12 18:52:35.071080 extend-filesystems[1042]: Found vda9 Apr 12 18:52:35.071080 extend-filesystems[1042]: Checking size of /dev/vda9 Apr 12 18:52:35.073988 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:52:35.074015 systemd[1]: Reached target system-config.target. Apr 12 18:52:35.074563 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:52:35.074580 systemd[1]: Reached target user-config.target. Apr 12 18:52:35.078213 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:52:35.078408 systemd[1]: Finished motdgen.service. Apr 12 18:52:35.111260 extend-filesystems[1042]: Resized partition /dev/vda9 Apr 12 18:52:35.119029 extend-filesystems[1090]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:52:35.151964 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Apr 12 18:52:35.212609 update_engine[1050]: I0412 18:52:35.211475 1050 main.cc:92] Flatcar Update Engine starting Apr 12 18:52:35.261783 update_engine[1050]: I0412 18:52:35.222730 1050 update_check_scheduler.cc:74] Next update check in 2m25s Apr 12 18:52:35.261902 coreos-metadata[1037]: Apr 12 18:52:35.226 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Apr 12 18:52:35.217903 systemd[1]: Started update-engine.service. Apr 12 18:52:35.220394 systemd[1]: Started locksmithd.service. Apr 12 18:52:35.257054 systemd-logind[1049]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:52:35.257075 systemd-logind[1049]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:52:35.258209 systemd-logind[1049]: New seat seat0. Apr 12 18:52:35.260588 systemd[1]: Started systemd-logind.service. Apr 12 18:52:35.264189 env[1067]: time="2024-04-12T18:52:35.264114346Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:52:35.301953 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Apr 12 18:52:35.447843 env[1067]: time="2024-04-12T18:52:35.310899651Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:52:35.449652 extend-filesystems[1090]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:52:35.449652 extend-filesystems[1090]: old_desc_blocks = 1, new_desc_blocks = 3 Apr 12 18:52:35.449652 extend-filesystems[1090]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Apr 12 18:52:35.456669 extend-filesystems[1042]: Resized filesystem in /dev/vda9 Apr 12 18:52:35.457269 bash[1098]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:52:35.450472 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:52:35.450961 systemd[1]: Finished extend-filesystems.service. Apr 12 18:52:35.457698 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:52:35.462817 env[1067]: time="2024-04-12T18:52:35.462702528Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.465411258Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.465543306Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.466217129Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.466309703Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.466396927Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.466431091Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.466800574Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.467754132Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.468309063Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:35.469162 env[1067]: time="2024-04-12T18:52:35.468396907Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:52:35.469575 env[1067]: time="2024-04-12T18:52:35.468616650Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:52:35.469575 env[1067]: time="2024-04-12T18:52:35.468696569Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:52:35.487208 tar[1059]: ./bandwidth Apr 12 18:52:35.494545 env[1067]: time="2024-04-12T18:52:35.494470348Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:52:35.494661 env[1067]: time="2024-04-12T18:52:35.494558293Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:52:35.494661 env[1067]: time="2024-04-12T18:52:35.494599110Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:52:35.494771 env[1067]: time="2024-04-12T18:52:35.494713554Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.494933 env[1067]: time="2024-04-12T18:52:35.494872032Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495034 env[1067]: time="2024-04-12T18:52:35.494993580Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495072 env[1067]: time="2024-04-12T18:52:35.495046639Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495121 env[1067]: time="2024-04-12T18:52:35.495085362Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495156 env[1067]: time="2024-04-12T18:52:35.495133282Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495190 env[1067]: time="2024-04-12T18:52:35.495171433Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495239 env[1067]: time="2024-04-12T18:52:35.495205818Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.495278 env[1067]: time="2024-04-12T18:52:35.495250321Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:52:35.495524 env[1067]: time="2024-04-12T18:52:35.495480403Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:52:35.495736 env[1067]: time="2024-04-12T18:52:35.495691989Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:52:35.496818 env[1067]: time="2024-04-12T18:52:35.496714848Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:52:35.496818 env[1067]: time="2024-04-12T18:52:35.496796571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.496895 env[1067]: time="2024-04-12T18:52:35.496833460Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:52:35.497053 env[1067]: time="2024-04-12T18:52:35.497010883Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497210 env[1067]: time="2024-04-12T18:52:35.497169821Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497254 env[1067]: time="2024-04-12T18:52:35.497221899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497286 env[1067]: time="2024-04-12T18:52:35.497254119Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497317 env[1067]: time="2024-04-12T18:52:35.497288985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497349 env[1067]: time="2024-04-12T18:52:35.497322768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497377 env[1067]: time="2024-04-12T18:52:35.497354868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497403 env[1067]: time="2024-04-12T18:52:35.497386007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497469 env[1067]: time="2024-04-12T18:52:35.497424419Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:52:35.497797 env[1067]: time="2024-04-12T18:52:35.497751312Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497840 env[1067]: time="2024-04-12T18:52:35.497813258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497868 env[1067]: time="2024-04-12T18:52:35.497849516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.497936 env[1067]: time="2024-04-12T18:52:35.497883590Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:52:35.498009 env[1067]: time="2024-04-12T18:52:35.497965774Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:52:35.498048 env[1067]: time="2024-04-12T18:52:35.498009927Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:52:35.498082 env[1067]: time="2024-04-12T18:52:35.498057185Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:52:35.498181 env[1067]: time="2024-04-12T18:52:35.498141874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:52:35.498802 env[1067]: time="2024-04-12T18:52:35.498658032Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:52:35.503012 env[1067]: time="2024-04-12T18:52:35.498882092Z" level=info msg="Connect containerd service" Apr 12 18:52:35.503012 env[1067]: time="2024-04-12T18:52:35.499026243Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:52:35.503012 env[1067]: time="2024-04-12T18:52:35.500413284Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:52:35.505176 env[1067]: time="2024-04-12T18:52:35.505134369Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:52:35.505246 env[1067]: time="2024-04-12T18:52:35.505223516Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:52:35.505391 systemd[1]: Started containerd.service. Apr 12 18:52:35.506447 env[1067]: time="2024-04-12T18:52:35.506341993Z" level=info msg="containerd successfully booted in 0.288392s" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509041997Z" level=info msg="Start subscribing containerd event" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509118882Z" level=info msg="Start recovering state" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509201907Z" level=info msg="Start event monitor" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509298408Z" level=info msg="Start snapshots syncer" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509312214Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:52:35.510525 env[1067]: time="2024-04-12T18:52:35.509326351Z" level=info msg="Start streaming server" Apr 12 18:52:35.586540 coreos-metadata[1037]: Apr 12 18:52:35.586 INFO Fetch successful Apr 12 18:52:35.586540 coreos-metadata[1037]: Apr 12 18:52:35.586 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:52:35.598158 coreos-metadata[1037]: Apr 12 18:52:35.597 INFO Fetch successful Apr 12 18:52:35.613379 unknown[1037]: wrote ssh authorized keys file for user: core Apr 12 18:52:35.616070 tar[1059]: ./ptp Apr 12 18:52:35.671039 update-ssh-keys[1109]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:52:35.671602 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:52:35.714911 tar[1059]: ./vlan Apr 12 18:52:35.795688 tar[1059]: ./host-device Apr 12 18:52:35.906439 tar[1059]: ./tuning Apr 12 18:52:35.980813 tar[1059]: ./vrf Apr 12 18:52:36.050096 tar[1059]: ./sbr Apr 12 18:52:36.144174 systemd[1]: Finished prepare-critools.service. Apr 12 18:52:36.149262 tar[1059]: ./tap Apr 12 18:52:36.224100 tar[1059]: ./dhcp Apr 12 18:52:36.331409 tar[1061]: linux-amd64/LICENSE Apr 12 18:52:36.331778 tar[1061]: linux-amd64/README.md Apr 12 18:52:36.336128 systemd[1]: Finished prepare-helm.service. Apr 12 18:52:36.376842 tar[1059]: ./static Apr 12 18:52:36.404709 tar[1059]: ./firewall Apr 12 18:52:36.447253 tar[1059]: ./macvlan Apr 12 18:52:36.451312 locksmithd[1099]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:52:36.487068 tar[1059]: ./dummy Apr 12 18:52:36.525104 tar[1059]: ./bridge Apr 12 18:52:36.567113 tar[1059]: ./ipvlan Apr 12 18:52:36.605979 tar[1059]: ./portmap Apr 12 18:52:36.643617 tar[1059]: ./host-local Apr 12 18:52:36.687584 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:52:36.846707 sshd_keygen[1069]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:52:36.882849 systemd[1]: Finished sshd-keygen.service. Apr 12 18:52:36.887304 systemd[1]: Starting issuegen.service... Apr 12 18:52:36.894175 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:52:36.894498 systemd[1]: Finished issuegen.service. Apr 12 18:52:36.898601 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:52:36.905087 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:52:36.909387 systemd[1]: Started getty@tty1.service. Apr 12 18:52:36.913284 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:52:36.914858 systemd[1]: Reached target getty.target. Apr 12 18:52:36.916245 systemd[1]: Reached target multi-user.target. Apr 12 18:52:36.923192 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:52:36.938536 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:52:36.938881 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:52:36.940110 systemd[1]: Startup finished in 954ms (kernel) + 1min 47.962s (initrd) + 9.298s (userspace) = 1min 58.215s. Apr 12 18:52:37.399351 systemd[1]: Created slice system-sshd.slice. Apr 12 18:52:37.402003 systemd[1]: Started sshd@0-172.24.4.50:22-172.24.4.1:39066.service. Apr 12 18:52:39.021500 sshd[1129]: Accepted publickey for core from 172.24.4.1 port 39066 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:39.025984 sshd[1129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:39.049910 systemd[1]: Created slice user-500.slice. Apr 12 18:52:39.052661 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:52:39.064805 systemd-logind[1049]: New session 1 of user core. Apr 12 18:52:39.075575 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:52:39.078769 systemd[1]: Starting user@500.service... Apr 12 18:52:39.085856 (systemd)[1132]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:39.210821 systemd[1132]: Queued start job for default target default.target. Apr 12 18:52:39.211409 systemd[1132]: Reached target paths.target. Apr 12 18:52:39.211429 systemd[1132]: Reached target sockets.target. Apr 12 18:52:39.211445 systemd[1132]: Reached target timers.target. Apr 12 18:52:39.211459 systemd[1132]: Reached target basic.target. Apr 12 18:52:39.211502 systemd[1132]: Reached target default.target. Apr 12 18:52:39.211529 systemd[1132]: Startup finished in 113ms. Apr 12 18:52:39.212627 systemd[1]: Started user@500.service. Apr 12 18:52:39.215721 systemd[1]: Started session-1.scope. Apr 12 18:52:39.714642 systemd[1]: Started sshd@1-172.24.4.50:22-172.24.4.1:41260.service. Apr 12 18:52:41.239226 sshd[1141]: Accepted publickey for core from 172.24.4.1 port 41260 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:41.242104 sshd[1141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:41.250694 systemd-logind[1049]: New session 2 of user core. Apr 12 18:52:41.253579 systemd[1]: Started session-2.scope. Apr 12 18:52:41.882418 sshd[1141]: pam_unix(sshd:session): session closed for user core Apr 12 18:52:41.888646 systemd[1]: Started sshd@2-172.24.4.50:22-172.24.4.1:41266.service. Apr 12 18:52:41.895727 systemd[1]: sshd@1-172.24.4.50:22-172.24.4.1:41260.service: Deactivated successfully. Apr 12 18:52:41.897365 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:52:41.900187 systemd-logind[1049]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:52:41.902455 systemd-logind[1049]: Removed session 2. Apr 12 18:52:43.392290 sshd[1146]: Accepted publickey for core from 172.24.4.1 port 41266 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:43.395505 sshd[1146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:43.406747 systemd[1]: Started session-3.scope. Apr 12 18:52:43.407080 systemd-logind[1049]: New session 3 of user core. Apr 12 18:52:44.232269 sshd[1146]: pam_unix(sshd:session): session closed for user core Apr 12 18:52:44.237120 systemd[1]: sshd@2-172.24.4.50:22-172.24.4.1:41266.service: Deactivated successfully. Apr 12 18:52:44.238441 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:52:44.241527 systemd-logind[1049]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:52:44.243791 systemd[1]: Started sshd@3-172.24.4.50:22-172.24.4.1:41272.service. Apr 12 18:52:44.246835 systemd-logind[1049]: Removed session 3. Apr 12 18:52:45.575801 sshd[1153]: Accepted publickey for core from 172.24.4.1 port 41272 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:45.578274 sshd[1153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:45.589119 systemd[1]: Started session-4.scope. Apr 12 18:52:45.589970 systemd-logind[1049]: New session 4 of user core. Apr 12 18:52:46.432611 sshd[1153]: pam_unix(sshd:session): session closed for user core Apr 12 18:52:46.441638 systemd[1]: Started sshd@4-172.24.4.50:22-172.24.4.1:58906.service. Apr 12 18:52:46.446346 systemd[1]: sshd@3-172.24.4.50:22-172.24.4.1:41272.service: Deactivated successfully. Apr 12 18:52:46.448225 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:52:46.452810 systemd-logind[1049]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:52:46.455450 systemd-logind[1049]: Removed session 4. Apr 12 18:52:47.761328 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 58906 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:47.766123 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:47.779106 systemd[1]: Started session-5.scope. Apr 12 18:52:47.781054 systemd-logind[1049]: New session 5 of user core. Apr 12 18:52:48.242876 sudo[1162]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:52:48.243390 sudo[1162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:52:48.258746 dbus-daemon[1040]: Ѝ\xca\u0001YU: received setenforce notice (enforcing=1141267472) Apr 12 18:52:48.259134 sudo[1162]: pam_unix(sudo:session): session closed for user root Apr 12 18:52:48.457507 sshd[1158]: pam_unix(sshd:session): session closed for user core Apr 12 18:52:48.464822 systemd[1]: Started sshd@5-172.24.4.50:22-172.24.4.1:58922.service. Apr 12 18:52:48.467379 systemd[1]: sshd@4-172.24.4.50:22-172.24.4.1:58906.service: Deactivated successfully. Apr 12 18:52:48.468970 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:52:48.472453 systemd-logind[1049]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:52:48.474588 systemd-logind[1049]: Removed session 5. Apr 12 18:52:49.641322 sshd[1165]: Accepted publickey for core from 172.24.4.1 port 58922 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:49.646592 sshd[1165]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:49.659757 systemd-logind[1049]: New session 6 of user core. Apr 12 18:52:49.661157 systemd[1]: Started session-6.scope. Apr 12 18:52:50.146644 sudo[1170]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:52:50.147786 sudo[1170]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:52:50.154349 sudo[1170]: pam_unix(sudo:session): session closed for user root Apr 12 18:52:50.164166 sudo[1169]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:52:50.164627 sudo[1169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:52:50.185139 systemd[1]: Stopping audit-rules.service... Apr 12 18:52:50.189008 kernel: kauditd_printk_skb: 137 callbacks suppressed Apr 12 18:52:50.189145 kernel: audit: type=1305 audit(1712947970.185:175): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:52:50.185000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:52:50.185000 audit[1173]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc94510d70 a2=420 a3=0 items=0 ppid=1 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:50.194270 auditctl[1173]: No rules Apr 12 18:52:50.205066 kernel: audit: type=1300 audit(1712947970.185:175): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc94510d70 a2=420 a3=0 items=0 ppid=1 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:50.205197 kernel: audit: type=1327 audit(1712947970.185:175): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:52:50.185000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:52:50.195436 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:52:50.195817 systemd[1]: Stopped audit-rules.service. Apr 12 18:52:50.206905 systemd[1]: Starting audit-rules.service... Apr 12 18:52:50.219991 kernel: audit: type=1131 audit(1712947970.193:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.247148 augenrules[1190]: No rules Apr 12 18:52:50.248750 systemd[1]: Finished audit-rules.service. Apr 12 18:52:50.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.262369 kernel: audit: type=1130 audit(1712947970.248:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.262516 kernel: audit: type=1106 audit(1712947970.259:178): pid=1169 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.259000 audit[1169]: USER_END pid=1169 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.260703 sudo[1169]: pam_unix(sudo:session): session closed for user root Apr 12 18:52:50.260000 audit[1169]: CRED_DISP pid=1169 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.276280 kernel: audit: type=1104 audit(1712947970.260:179): pid=1169 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.486596 sshd[1165]: pam_unix(sshd:session): session closed for user core Apr 12 18:52:50.489000 audit[1165]: USER_END pid=1165 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:50.489000 audit[1165]: CRED_DISP pid=1165 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:50.519718 kernel: audit: type=1106 audit(1712947970.489:180): pid=1165 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:50.519864 kernel: audit: type=1104 audit(1712947970.489:181): pid=1165 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:50.519978 kernel: audit: type=1130 audit(1712947970.515:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.50:22-172.24.4.1:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.50:22-172.24.4.1:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.516120 systemd[1]: Started sshd@6-172.24.4.50:22-172.24.4.1:58932.service. Apr 12 18:52:50.517439 systemd[1]: sshd@5-172.24.4.50:22-172.24.4.1:58922.service: Deactivated successfully. Apr 12 18:52:50.519019 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:52:50.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.50:22-172.24.4.1:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.528396 systemd-logind[1049]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:52:50.531312 systemd-logind[1049]: Removed session 6. Apr 12 18:52:51.770000 audit[1195]: USER_ACCT pid=1195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:51.772060 sshd[1195]: Accepted publickey for core from 172.24.4.1 port 58932 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:52:51.773000 audit[1195]: CRED_ACQ pid=1195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:51.773000 audit[1195]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe61d96040 a2=3 a3=0 items=0 ppid=1 pid=1195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:51.773000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:52:51.775669 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:52:51.785901 systemd-logind[1049]: New session 7 of user core. Apr 12 18:52:51.786503 systemd[1]: Started session-7.scope. Apr 12 18:52:51.797000 audit[1195]: USER_START pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:51.800000 audit[1198]: CRED_ACQ pid=1198 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:52:52.211000 audit[1199]: USER_ACCT pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.213130 sudo[1199]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:52:52.212000 audit[1199]: CRED_REFR pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.214354 sudo[1199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:52:52.217000 audit[1199]: USER_START pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.133227 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:52:53.146158 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:52:53.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.147719 systemd[1]: Reached target network-online.target. Apr 12 18:52:53.151596 systemd[1]: Starting docker.service... Apr 12 18:52:53.211272 env[1215]: time="2024-04-12T18:52:53.211174332Z" level=info msg="Starting up" Apr 12 18:52:53.214461 env[1215]: time="2024-04-12T18:52:53.213019162Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:52:53.214461 env[1215]: time="2024-04-12T18:52:53.213040793Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:52:53.214461 env[1215]: time="2024-04-12T18:52:53.213065649Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:52:53.214461 env[1215]: time="2024-04-12T18:52:53.213079305Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:52:53.219551 env[1215]: time="2024-04-12T18:52:53.219498484Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:52:53.219551 env[1215]: time="2024-04-12T18:52:53.219520676Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:52:53.219551 env[1215]: time="2024-04-12T18:52:53.219536054Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:52:53.220044 env[1215]: time="2024-04-12T18:52:53.219546574Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:52:53.240147 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport247576269-merged.mount: Deactivated successfully. Apr 12 18:52:53.306394 env[1215]: time="2024-04-12T18:52:53.306291685Z" level=info msg="Loading containers: start." Apr 12 18:52:53.450000 audit[1246]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.450000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd433252e0 a2=0 a3=7ffd433252cc items=0 ppid=1215 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:52:53.454000 audit[1248]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.454000 audit[1248]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcb1ae04e0 a2=0 a3=7ffcb1ae04cc items=0 ppid=1215 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:52:53.456000 audit[1250]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.456000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffce55c5fd0 a2=0 a3=7ffce55c5fbc items=0 ppid=1215 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:52:53.458000 audit[1252]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.458000 audit[1252]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc8fe47850 a2=0 a3=7ffc8fe4783c items=0 ppid=1215 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:52:53.462000 audit[1254]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.462000 audit[1254]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe944447c0 a2=0 a3=7ffe944447ac items=0 ppid=1215 pid=1254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.462000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:52:53.491000 audit[1259]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.491000 audit[1259]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedcf8e2d0 a2=0 a3=7ffedcf8e2bc items=0 ppid=1215 pid=1259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:52:53.505000 audit[1261]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.505000 audit[1261]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfdb656d0 a2=0 a3=7ffdfdb656bc items=0 ppid=1215 pid=1261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:52:53.510000 audit[1263]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.510000 audit[1263]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffee96b3ce0 a2=0 a3=7ffee96b3ccc items=0 ppid=1215 pid=1263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.510000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:52:53.515000 audit[1265]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.515000 audit[1265]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc17c7e910 a2=0 a3=7ffc17c7e8fc items=0 ppid=1215 pid=1265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.515000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:52:53.531000 audit[1269]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.531000 audit[1269]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc567e2770 a2=0 a3=7ffc567e275c items=0 ppid=1215 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:52:53.535000 audit[1270]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.535000 audit[1270]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffde70d9c0 a2=0 a3=7fffde70d9ac items=0 ppid=1215 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:52:53.556006 kernel: Initializing XFRM netlink socket Apr 12 18:52:53.597848 env[1215]: time="2024-04-12T18:52:53.597790631Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:52:53.634000 audit[1278]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.634000 audit[1278]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcd8c90e50 a2=0 a3=7ffcd8c90e3c items=0 ppid=1215 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:52:53.654000 audit[1281]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.654000 audit[1281]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcd886ca00 a2=0 a3=7ffcd886c9ec items=0 ppid=1215 pid=1281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:52:53.660000 audit[1284]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.660000 audit[1284]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdf7fa8000 a2=0 a3=7ffdf7fa7fec items=0 ppid=1215 pid=1284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:52:53.664000 audit[1286]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.664000 audit[1286]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff48fe3960 a2=0 a3=7fff48fe394c items=0 ppid=1215 pid=1286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:52:53.669000 audit[1288]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.669000 audit[1288]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff28ff01e0 a2=0 a3=7fff28ff01cc items=0 ppid=1215 pid=1288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:52:53.675000 audit[1290]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.675000 audit[1290]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffef11014f0 a2=0 a3=7ffef11014dc items=0 ppid=1215 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:52:53.678000 audit[1292]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.678000 audit[1292]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffea823640 a2=0 a3=7fffea82362c items=0 ppid=1215 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:52:53.696000 audit[1295]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.696000 audit[1295]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffee8354500 a2=0 a3=7ffee83544ec items=0 ppid=1215 pid=1295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:52:53.700000 audit[1297]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.700000 audit[1297]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffcf5ffab0 a2=0 a3=7fffcf5ffa9c items=0 ppid=1215 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:52:53.702000 audit[1299]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.702000 audit[1299]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd429eb340 a2=0 a3=7ffd429eb32c items=0 ppid=1215 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:52:53.706000 audit[1301]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.706000 audit[1301]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6beb2380 a2=0 a3=7ffd6beb236c items=0 ppid=1215 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:52:53.708061 systemd-networkd[978]: docker0: Link UP Apr 12 18:52:53.719000 audit[1305]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.719000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3ac3d4c0 a2=0 a3=7ffc3ac3d4ac items=0 ppid=1215 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:52:53.720000 audit[1306]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:52:53.720000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd34fc9c40 a2=0 a3=7ffd34fc9c2c items=0 ppid=1215 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.720000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:52:53.722383 env[1215]: time="2024-04-12T18:52:53.722335114Z" level=info msg="Loading containers: done." Apr 12 18:52:53.807474 env[1215]: time="2024-04-12T18:52:53.807390696Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:52:53.808336 env[1215]: time="2024-04-12T18:52:53.808281336Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:52:53.808849 env[1215]: time="2024-04-12T18:52:53.808802714Z" level=info msg="Daemon has completed initialization" Apr 12 18:52:53.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.929656 systemd[1]: Started docker.service. Apr 12 18:52:53.961435 env[1215]: time="2024-04-12T18:52:53.959651330Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:52:54.007580 systemd[1]: Reloading. Apr 12 18:52:54.136994 /usr/lib/systemd/system-generators/torcx-generator[1353]: time="2024-04-12T18:52:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:52:54.137336 /usr/lib/systemd/system-generators/torcx-generator[1353]: time="2024-04-12T18:52:54Z" level=info msg="torcx already run" Apr 12 18:52:54.227188 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:52:54.227670 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:52:54.253117 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit: BPF prog-id=37 op=LOAD Apr 12 18:52:54.323000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit: BPF prog-id=38 op=LOAD Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.324000 audit: BPF prog-id=39 op=LOAD Apr 12 18:52:54.324000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:52:54.324000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit: BPF prog-id=40 op=LOAD Apr 12 18:52:54.327000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit: BPF prog-id=41 op=LOAD Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.328000 audit: BPF prog-id=42 op=LOAD Apr 12 18:52:54.328000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:52:54.328000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:52:54.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit: BPF prog-id=43 op=LOAD Apr 12 18:52:54.334000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit: BPF prog-id=44 op=LOAD Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.335000 audit: BPF prog-id=45 op=LOAD Apr 12 18:52:54.336000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:52:54.336000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.337000 audit: BPF prog-id=46 op=LOAD Apr 12 18:52:54.338000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit: BPF prog-id=47 op=LOAD Apr 12 18:52:54.341000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit: BPF prog-id=48 op=LOAD Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.342000 audit: BPF prog-id=49 op=LOAD Apr 12 18:52:54.343000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:52:54.343000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:52:54.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.345000 audit: BPF prog-id=50 op=LOAD Apr 12 18:52:54.345000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:52:54.347000 audit: BPF prog-id=51 op=LOAD Apr 12 18:52:54.347000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:52:54.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.381015 systemd[1]: Started kubelet.service. Apr 12 18:52:54.459451 kubelet[1399]: E0412 18:52:54.459405 1399 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:52:54.461846 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:52:54.461998 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:52:54.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:52:55.436326 env[1067]: time="2024-04-12T18:52:55.435760082Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:52:56.145520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3206327929.mount: Deactivated successfully. Apr 12 18:52:59.231446 env[1067]: time="2024-04-12T18:52:59.231275009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:52:59.234177 env[1067]: time="2024-04-12T18:52:59.234130635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:52:59.237745 env[1067]: time="2024-04-12T18:52:59.237702354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:52:59.241290 env[1067]: time="2024-04-12T18:52:59.241246641Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:52:59.243383 env[1067]: time="2024-04-12T18:52:59.243328065Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533\"" Apr 12 18:52:59.258416 env[1067]: time="2024-04-12T18:52:59.258352984Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:53:02.385807 env[1067]: time="2024-04-12T18:53:02.385696897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:02.389098 env[1067]: time="2024-04-12T18:53:02.389045838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:02.393261 env[1067]: time="2024-04-12T18:53:02.393208885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:02.399416 env[1067]: time="2024-04-12T18:53:02.399353490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:02.400249 env[1067]: time="2024-04-12T18:53:02.400192143Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3\"" Apr 12 18:53:02.431399 env[1067]: time="2024-04-12T18:53:02.431315595Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:53:04.546599 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:53:04.546804 systemd[1]: Stopped kubelet.service. Apr 12 18:53:04.561963 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:53:04.562111 kernel: audit: type=1130 audit(1712947984.545:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.550212 systemd[1]: Started kubelet.service. Apr 12 18:53:04.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.572972 kernel: audit: type=1131 audit(1712947984.545:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.582989 kernel: audit: type=1130 audit(1712947984.549:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:04.681504 kubelet[1426]: E0412 18:53:04.681449 1426 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:04.684641 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:04.684841 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:04.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:04.688955 kernel: audit: type=1131 audit(1712947984.684:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:04.970459 env[1067]: time="2024-04-12T18:53:04.970328833Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:04.972586 env[1067]: time="2024-04-12T18:53:04.972555299Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:04.975088 env[1067]: time="2024-04-12T18:53:04.975041672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:04.978564 env[1067]: time="2024-04-12T18:53:04.978527119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:04.979731 env[1067]: time="2024-04-12T18:53:04.979692525Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b\"" Apr 12 18:53:04.991689 env[1067]: time="2024-04-12T18:53:04.991653728Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:53:06.763792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4195840530.mount: Deactivated successfully. Apr 12 18:53:07.778829 env[1067]: time="2024-04-12T18:53:07.778667585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:07.781828 env[1067]: time="2024-04-12T18:53:07.781769348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:07.784378 env[1067]: time="2024-04-12T18:53:07.784346952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:07.787142 env[1067]: time="2024-04-12T18:53:07.787119653Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:07.788384 env[1067]: time="2024-04-12T18:53:07.788314762Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 18:53:07.802672 env[1067]: time="2024-04-12T18:53:07.802608141Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:53:08.535021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount730616458.mount: Deactivated successfully. Apr 12 18:53:10.462715 env[1067]: time="2024-04-12T18:53:10.462642283Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:10.465100 env[1067]: time="2024-04-12T18:53:10.465038175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:10.473315 env[1067]: time="2024-04-12T18:53:10.473232263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:10.479757 env[1067]: time="2024-04-12T18:53:10.479703920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:10.480142 env[1067]: time="2024-04-12T18:53:10.480112592Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Apr 12 18:53:10.491614 env[1067]: time="2024-04-12T18:53:10.491575861Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:53:11.091364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3660159871.mount: Deactivated successfully. Apr 12 18:53:11.104522 env[1067]: time="2024-04-12T18:53:11.104401063Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.108527 env[1067]: time="2024-04-12T18:53:11.108462196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.114104 env[1067]: time="2024-04-12T18:53:11.114047245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.118783 env[1067]: time="2024-04-12T18:53:11.118690437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.123375 env[1067]: time="2024-04-12T18:53:11.121630094Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:53:11.147436 env[1067]: time="2024-04-12T18:53:11.147314620Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:53:11.797387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3540330552.mount: Deactivated successfully. Apr 12 18:53:14.797172 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:53:14.797526 systemd[1]: Stopped kubelet.service. Apr 12 18:53:14.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.803953 kernel: audit: type=1130 audit(1712947994.795:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.804377 systemd[1]: Started kubelet.service. Apr 12 18:53:14.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.812940 kernel: audit: type=1131 audit(1712947994.795:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.820943 kernel: audit: type=1130 audit(1712947994.802:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:14.883150 kubelet[1455]: E0412 18:53:14.883095 1455 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:14.885127 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:14.885268 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:14.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:14.889956 kernel: audit: type=1131 audit(1712947994.883:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:15.600346 env[1067]: time="2024-04-12T18:53:15.600221625Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:15.604049 env[1067]: time="2024-04-12T18:53:15.603985237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:15.608759 env[1067]: time="2024-04-12T18:53:15.608701514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:15.613519 env[1067]: time="2024-04-12T18:53:15.613439623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:15.616126 env[1067]: time="2024-04-12T18:53:15.616034051Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Apr 12 18:53:20.296675 systemd[1]: Stopped kubelet.service. Apr 12 18:53:20.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.306946 kernel: audit: type=1130 audit(1712948000.297:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.316229 kernel: audit: type=1131 audit(1712948000.300:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.331656 systemd[1]: Reloading. Apr 12 18:53:20.453280 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2024-04-12T18:53:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:20.453312 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2024-04-12T18:53:20Z" level=info msg="torcx already run" Apr 12 18:53:20.538180 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:20.538200 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:20.564185 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.652028 kernel: audit: type=1400 audit(1712948000.635:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.652215 kernel: audit: type=1400 audit(1712948000.635:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.660127 kernel: audit: type=1400 audit(1712948000.635:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.668116 kernel: audit: type=1400 audit(1712948000.635:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.668209 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681479 kernel: audit: type=1400 audit(1712948000.635:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681638 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:53:20.681699 kernel: audit: backlog limit exceeded Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit: BPF prog-id=52 op=LOAD Apr 12 18:53:20.643000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit: BPF prog-id=53 op=LOAD Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.651000 audit: BPF prog-id=54 op=LOAD Apr 12 18:53:20.651000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:53:20.651000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit: BPF prog-id=55 op=LOAD Apr 12 18:53:20.659000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit: BPF prog-id=56 op=LOAD Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.659000 audit: BPF prog-id=57 op=LOAD Apr 12 18:53:20.659000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:53:20.659000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:53:20.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.680000 audit: BPF prog-id=59 op=LOAD Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.682000 audit: BPF prog-id=62 op=LOAD Apr 12 18:53:20.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit: BPF prog-id=65 op=LOAD Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:20.684000 audit: BPF prog-id=66 op=LOAD Apr 12 18:53:20.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:20.711526 systemd[1]: Started kubelet.service. Apr 12 18:53:20.751263 update_engine[1050]: I0412 18:53:20.750627 1050 update_attempter.cc:509] Updating boot flags... Apr 12 18:53:20.798015 kubelet[1590]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:20.798015 kubelet[1590]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:20.798015 kubelet[1590]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:20.798331 kubelet[1590]: I0412 18:53:20.798135 1590 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:21.260770 kubelet[1590]: I0412 18:53:21.260717 1590 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:21.260770 kubelet[1590]: I0412 18:53:21.260776 1590 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:21.261252 kubelet[1590]: I0412 18:53:21.261223 1590 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:21.269087 kubelet[1590]: E0412 18:53:21.269053 1590 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.50:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.270883 kubelet[1590]: I0412 18:53:21.270801 1590 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:21.277620 kubelet[1590]: I0412 18:53:21.277600 1590 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:21.278003 kubelet[1590]: I0412 18:53:21.277990 1590 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:21.278240 kubelet[1590]: I0412 18:53:21.278224 1590 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:21.278371 kubelet[1590]: I0412 18:53:21.278359 1590 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:21.278448 kubelet[1590]: I0412 18:53:21.278437 1590 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:21.278598 kubelet[1590]: I0412 18:53:21.278585 1590 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:21.278764 kubelet[1590]: I0412 18:53:21.278753 1590 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:21.279167 kubelet[1590]: I0412 18:53:21.279155 1590 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:21.279260 kubelet[1590]: I0412 18:53:21.279250 1590 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:21.279335 kubelet[1590]: I0412 18:53:21.279325 1590 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:21.279412 kubelet[1590]: W0412 18:53:21.279336 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.24.4.50:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d-76b1f6eb3d.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.279452 kubelet[1590]: E0412 18:53:21.279442 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.50:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d-76b1f6eb3d.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.279878 kubelet[1590]: W0412 18:53:21.279849 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.24.4.50:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.279995 kubelet[1590]: E0412 18:53:21.279983 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.50:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.280560 kubelet[1590]: I0412 18:53:21.280545 1590 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:21.281127 kubelet[1590]: I0412 18:53:21.281114 1590 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:21.281241 kubelet[1590]: W0412 18:53:21.281231 1590 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:53:21.282040 kubelet[1590]: I0412 18:53:21.282027 1590 server.go:1256] "Started kubelet" Apr 12 18:53:21.284136 kubelet[1590]: I0412 18:53:21.284102 1590 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:21.287597 kubelet[1590]: I0412 18:53:21.287562 1590 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:21.291859 kubelet[1590]: I0412 18:53:21.291832 1590 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:21.292749 kubelet[1590]: I0412 18:53:21.292712 1590 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:21.293387 kubelet[1590]: E0412 18:53:21.293354 1590 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.50:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.50:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-3-d-76b1f6eb3d.novalocal.17c59d21af21178b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-3-d-76b1f6eb3d.novalocal,UID:ci-3510-3-3-d-76b1f6eb3d.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-3-d-76b1f6eb3d.novalocal,},FirstTimestamp:2024-04-12 18:53:21.282004875 +0000 UTC m=+0.565466658,LastTimestamp:2024-04-12 18:53:21.282004875 +0000 UTC m=+0.565466658,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-3-d-76b1f6eb3d.novalocal,}" Apr 12 18:53:21.293000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:21.293000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:21.293000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000db34d0 a1=c000db15d8 a2=c000db34a0 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.293000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:21.294854 kubelet[1590]: I0412 18:53:21.294842 1590 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:21.294000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:21.294000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:21.294000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004e0dc0 a1=c000db15f0 a2=c000db3560 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.294000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:21.295155 kubelet[1590]: I0412 18:53:21.295142 1590 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:21.295266 kubelet[1590]: I0412 18:53:21.295255 1590 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:21.299000 audit[1615]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.299000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd6a6d000 a2=0 a3=7ffcd6a6cfec items=0 ppid=1590 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:21.302423 kubelet[1590]: E0412 18:53:21.302407 1590 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:21.302643 kubelet[1590]: E0412 18:53:21.302631 1590 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-3-d-76b1f6eb3d.novalocal\" not found" Apr 12 18:53:21.302747 kubelet[1590]: I0412 18:53:21.302736 1590 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:21.302888 kubelet[1590]: I0412 18:53:21.302875 1590 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:21.303029 kubelet[1590]: I0412 18:53:21.303017 1590 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:21.303442 kubelet[1590]: W0412 18:53:21.303405 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.24.4.50:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.303533 kubelet[1590]: E0412 18:53:21.303520 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.50:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.303875 kubelet[1590]: E0412 18:53:21.303861 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.50:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d-76b1f6eb3d.novalocal?timeout=10s\": dial tcp 172.24.4.50:6443: connect: connection refused" interval="200ms" Apr 12 18:53:21.304582 kubelet[1590]: I0412 18:53:21.304567 1590 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:21.304714 kubelet[1590]: I0412 18:53:21.304698 1590 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:21.305951 kubelet[1590]: I0412 18:53:21.305936 1590 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:21.305000 audit[1616]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.305000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4126c040 a2=0 a3=7fff4126c02c items=0 ppid=1590 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:21.319000 audit[1620]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.319000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe16a47770 a2=0 a3=7ffe16a4775c items=0 ppid=1590 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:21.325000 audit[1622]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.325000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe61721b20 a2=0 a3=7ffe61721b0c items=0 ppid=1590 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:21.341743 kubelet[1590]: I0412 18:53:21.341705 1590 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:21.342039 kubelet[1590]: I0412 18:53:21.342026 1590 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:21.342131 kubelet[1590]: I0412 18:53:21.342120 1590 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:21.343000 audit[1625]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.343000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc46898b70 a2=0 a3=7ffc46898b5c items=0 ppid=1590 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:53:21.345243 kubelet[1590]: I0412 18:53:21.345229 1590 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:21.345000 audit[1627]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.345000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9c4cc050 a2=0 a3=7ffc9c4cc03c items=0 ppid=1590 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:21.346000 audit[1628]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.346000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb97697d0 a2=0 a3=7fffb97697bc items=0 ppid=1590 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:21.346000 audit[1626]: NETFILTER_CFG table=mangle:33 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:21.346000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc84cabc90 a2=0 a3=7ffc84cabc7c items=0 ppid=1590 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:21.347962 kubelet[1590]: I0412 18:53:21.347937 1590 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:21.348059 kubelet[1590]: I0412 18:53:21.348046 1590 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:21.348160 kubelet[1590]: I0412 18:53:21.348148 1590 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:21.348271 kubelet[1590]: E0412 18:53:21.348259 1590 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:21.348000 audit[1630]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:21.348000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1883e640 a2=0 a3=7ffc1883e62c items=0 ppid=1590 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:21.348000 audit[1629]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:21.348000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff69fa89c0 a2=0 a3=7fff69fa89ac items=0 ppid=1590 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:21.350707 kubelet[1590]: I0412 18:53:21.350692 1590 policy_none.go:49] "None policy: Start" Apr 12 18:53:21.351349 kubelet[1590]: W0412 18:53:21.351299 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.24.4.50:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.351453 kubelet[1590]: E0412 18:53:21.351442 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.50:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:21.351000 audit[1631]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:21.351000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb1f9d920 a2=0 a3=7ffcb1f9d90c items=0 ppid=1590 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:21.352611 kubelet[1590]: I0412 18:53:21.352572 1590 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:21.352664 kubelet[1590]: I0412 18:53:21.352635 1590 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:21.352000 audit[1632]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:21.352000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc34b70960 a2=0 a3=7ffc34b7094c items=0 ppid=1590 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:21.362018 systemd[1]: Created slice kubepods.slice. Apr 12 18:53:21.368849 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:53:21.374214 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:53:21.381878 kubelet[1590]: I0412 18:53:21.381846 1590 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:21.381000 audit[1590]: AVC avc: denied { mac_admin } for pid=1590 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:21.381000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:21.381000 audit[1590]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bcd6e0 a1=c000c3f050 a2=c000bcd6b0 a3=25 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:21.381000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:21.382264 kubelet[1590]: I0412 18:53:21.382034 1590 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:21.382650 kubelet[1590]: I0412 18:53:21.382638 1590 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:21.385589 kubelet[1590]: E0412 18:53:21.385558 1590 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-3-d-76b1f6eb3d.novalocal\" not found" Apr 12 18:53:21.405379 kubelet[1590]: I0412 18:53:21.405340 1590 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.405900 kubelet[1590]: E0412 18:53:21.405888 1590 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.50:6443/api/v1/nodes\": dial tcp 172.24.4.50:6443: connect: connection refused" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.423232 kubelet[1590]: E0412 18:53:21.423214 1590 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.50:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.50:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-3-d-76b1f6eb3d.novalocal.17c59d21af21178b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-3-d-76b1f6eb3d.novalocal,UID:ci-3510-3-3-d-76b1f6eb3d.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-3-d-76b1f6eb3d.novalocal,},FirstTimestamp:2024-04-12 18:53:21.282004875 +0000 UTC m=+0.565466658,LastTimestamp:2024-04-12 18:53:21.282004875 +0000 UTC m=+0.565466658,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-3-d-76b1f6eb3d.novalocal,}" Apr 12 18:53:21.448548 kubelet[1590]: I0412 18:53:21.448532 1590 topology_manager.go:215] "Topology Admit Handler" podUID="ebac0cd64ff08ad046a5247c7e72fd56" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.451439 kubelet[1590]: I0412 18:53:21.451391 1590 topology_manager.go:215] "Topology Admit Handler" podUID="00c73de132e45faeaa33b0728f39ca8d" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.454035 kubelet[1590]: I0412 18:53:21.454002 1590 topology_manager.go:215] "Topology Admit Handler" podUID="f01d70932301641230e8e473ed0a1b28" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.469240 systemd[1]: Created slice kubepods-burstable-podebac0cd64ff08ad046a5247c7e72fd56.slice. Apr 12 18:53:21.487160 systemd[1]: Created slice kubepods-burstable-podf01d70932301641230e8e473ed0a1b28.slice. Apr 12 18:53:21.496222 systemd[1]: Created slice kubepods-burstable-pod00c73de132e45faeaa33b0728f39ca8d.slice. Apr 12 18:53:21.504598 kubelet[1590]: E0412 18:53:21.504540 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.50:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d-76b1f6eb3d.novalocal?timeout=10s\": dial tcp 172.24.4.50:6443: connect: connection refused" interval="400ms" Apr 12 18:53:21.505044 kubelet[1590]: I0412 18:53:21.504984 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.505299 kubelet[1590]: I0412 18:53:21.505271 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.505610 kubelet[1590]: I0412 18:53:21.505508 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.505848 kubelet[1590]: I0412 18:53:21.505822 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f01d70932301641230e8e473ed0a1b28-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"f01d70932301641230e8e473ed0a1b28\") " pod="kube-system/kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.506111 kubelet[1590]: I0412 18:53:21.506082 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.506346 kubelet[1590]: I0412 18:53:21.506320 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.506563 kubelet[1590]: I0412 18:53:21.506539 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.506816 kubelet[1590]: I0412 18:53:21.506769 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.507078 kubelet[1590]: I0412 18:53:21.507051 1590 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.609428 kubelet[1590]: I0412 18:53:21.609340 1590 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.610159 kubelet[1590]: E0412 18:53:21.610106 1590 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.50:6443/api/v1/nodes\": dial tcp 172.24.4.50:6443: connect: connection refused" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:21.791740 env[1067]: time="2024-04-12T18:53:21.791152764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:ebac0cd64ff08ad046a5247c7e72fd56,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:21.799762 env[1067]: time="2024-04-12T18:53:21.799685919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:f01d70932301641230e8e473ed0a1b28,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:21.801002 env[1067]: time="2024-04-12T18:53:21.800395143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:00c73de132e45faeaa33b0728f39ca8d,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:21.906565 kubelet[1590]: E0412 18:53:21.906414 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.50:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d-76b1f6eb3d.novalocal?timeout=10s\": dial tcp 172.24.4.50:6443: connect: connection refused" interval="800ms" Apr 12 18:53:22.013808 kubelet[1590]: I0412 18:53:22.013736 1590 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:22.014397 kubelet[1590]: E0412 18:53:22.014331 1590 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.50:6443/api/v1/nodes\": dial tcp 172.24.4.50:6443: connect: connection refused" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:22.195454 kubelet[1590]: W0412 18:53:22.194896 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.24.4.50:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.195454 kubelet[1590]: E0412 18:53:22.195047 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.50:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.465630 kubelet[1590]: W0412 18:53:22.465144 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.24.4.50:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.465630 kubelet[1590]: E0412 18:53:22.465259 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.50:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.496232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1198530262.mount: Deactivated successfully. Apr 12 18:53:22.511003 env[1067]: time="2024-04-12T18:53:22.510907250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.519023 env[1067]: time="2024-04-12T18:53:22.518970829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.531006 env[1067]: time="2024-04-12T18:53:22.530832412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.535308 env[1067]: time="2024-04-12T18:53:22.535257847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.542647 env[1067]: time="2024-04-12T18:53:22.542583428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.545491 env[1067]: time="2024-04-12T18:53:22.545407540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.551708 env[1067]: time="2024-04-12T18:53:22.551655103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.553715 env[1067]: time="2024-04-12T18:53:22.553665274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.555649 env[1067]: time="2024-04-12T18:53:22.555600745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.558029 env[1067]: time="2024-04-12T18:53:22.557977386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.560045 env[1067]: time="2024-04-12T18:53:22.559992777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.562257 env[1067]: time="2024-04-12T18:53:22.562204879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.572093 kubelet[1590]: W0412 18:53:22.571792 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.24.4.50:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d-76b1f6eb3d.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.572093 kubelet[1590]: E0412 18:53:22.572057 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.50:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d-76b1f6eb3d.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.608441 env[1067]: time="2024-04-12T18:53:22.606226459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:22.608441 env[1067]: time="2024-04-12T18:53:22.606266664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:22.608441 env[1067]: time="2024-04-12T18:53:22.606280511Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:22.608441 env[1067]: time="2024-04-12T18:53:22.606428058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8904ac64a6369aefeadcd4df89e562da0f36a580b1d355133d13f1d10597d0d3 pid=1643 runtime=io.containerd.runc.v2 Apr 12 18:53:22.619573 env[1067]: time="2024-04-12T18:53:22.619368320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:22.619573 env[1067]: time="2024-04-12T18:53:22.619436609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:22.619573 env[1067]: time="2024-04-12T18:53:22.619452789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:22.620064 env[1067]: time="2024-04-12T18:53:22.619957068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60bc441b5ff299ae306fcab4ad8f7f8f03eb0cde3dcb10bd0bf9e8d6759e9bd4 pid=1659 runtime=io.containerd.runc.v2 Apr 12 18:53:22.641982 systemd[1]: Started cri-containerd-60bc441b5ff299ae306fcab4ad8f7f8f03eb0cde3dcb10bd0bf9e8d6759e9bd4.scope. Apr 12 18:53:22.652987 env[1067]: time="2024-04-12T18:53:22.652223295Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:22.652987 env[1067]: time="2024-04-12T18:53:22.652259523Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:22.652987 env[1067]: time="2024-04-12T18:53:22.652273569Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:22.652987 env[1067]: time="2024-04-12T18:53:22.652378287Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a2c366767e6870b0d10f23270276484156f323a2049eeffb14fefc61ccdcb8d pid=1699 runtime=io.containerd.runc.v2 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.656000 audit: BPF prog-id=67 op=LOAD Apr 12 18:53:22.656000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.656000 audit[1671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1659 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626334343162356666323939616533303666636162346164386637 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1659 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626334343162356666323939616533303666636162346164386637 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.657000 audit: BPF prog-id=68 op=LOAD Apr 12 18:53:22.657000 audit[1671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035a150 items=0 ppid=1659 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626334343162356666323939616533303666636162346164386637 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.658000 audit: BPF prog-id=69 op=LOAD Apr 12 18:53:22.658000 audit[1671]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035a198 items=0 ppid=1659 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626334343162356666323939616533303666636162346164386637 Apr 12 18:53:22.660000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:53:22.660000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.660000 audit: BPF prog-id=70 op=LOAD Apr 12 18:53:22.660000 audit[1671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035a5a8 items=0 ppid=1659 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626334343162356666323939616533303666636162346164386637 Apr 12 18:53:22.670605 systemd[1]: Started cri-containerd-8904ac64a6369aefeadcd4df89e562da0f36a580b1d355133d13f1d10597d0d3.scope. Apr 12 18:53:22.683811 systemd[1]: Started cri-containerd-0a2c366767e6870b0d10f23270276484156f323a2049eeffb14fefc61ccdcb8d.scope. Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.700000 audit: BPF prog-id=71 op=LOAD Apr 12 18:53:22.702000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.702000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1699 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.710904 kubelet[1590]: E0412 18:53:22.710868 1590 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.50:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d-76b1f6eb3d.novalocal?timeout=10s\": dial tcp 172.24.4.50:6443: connect: connection refused" interval="1.6s" Apr 12 18:53:22.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326333363637363765363837306230643130663233323730323736 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1699 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326333363637363765363837306230643130663233323730323736 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.710000 audit: BPF prog-id=72 op=LOAD Apr 12 18:53:22.710000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a2770 items=0 ppid=1699 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326333363637363765363837306230643130663233323730323736 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.712000 audit: BPF prog-id=73 op=LOAD Apr 12 18:53:22.712000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a27b8 items=0 ppid=1699 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326333363637363765363837306230643130663233323730323736 Apr 12 18:53:22.713000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:53:22.713000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { perfmon } for pid=1709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit[1709]: AVC avc: denied { bpf } for pid=1709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.713000 audit: BPF prog-id=74 op=LOAD Apr 12 18:53:22.713000 audit[1709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a2bc8 items=0 ppid=1699 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326333363637363765363837306230643130663233323730323736 Apr 12 18:53:22.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.717000 audit: BPF prog-id=75 op=LOAD Apr 12 18:53:22.722000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.722000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303461633634613633363961656665616463643464663839653536 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303461633634613633363961656665616463643464663839653536 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.723000 audit: BPF prog-id=76 op=LOAD Apr 12 18:53:22.723000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000444980 items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303461633634613633363961656665616463643464663839653536 Apr 12 18:53:22.725187 env[1067]: time="2024-04-12T18:53:22.725104124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:00c73de132e45faeaa33b0728f39ca8d,Namespace:kube-system,Attempt:0,} returns sandbox id \"60bc441b5ff299ae306fcab4ad8f7f8f03eb0cde3dcb10bd0bf9e8d6759e9bd4\"" Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.724000 audit: BPF prog-id=77 op=LOAD Apr 12 18:53:22.724000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0004449c8 items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303461633634613633363961656665616463643464663839653536 Apr 12 18:53:22.725000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:53:22.725000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.729581 env[1067]: time="2024-04-12T18:53:22.729546541Z" level=info msg="CreateContainer within sandbox \"60bc441b5ff299ae306fcab4ad8f7f8f03eb0cde3dcb10bd0bf9e8d6759e9bd4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:53:22.725000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.725000 audit: BPF prog-id=78 op=LOAD Apr 12 18:53:22.725000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000444dd8 items=0 ppid=1643 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303461633634613633363961656665616463643464663839653536 Apr 12 18:53:22.755864 env[1067]: time="2024-04-12T18:53:22.755807151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:f01d70932301641230e8e473ed0a1b28,Namespace:kube-system,Attempt:0,} returns sandbox id \"0a2c366767e6870b0d10f23270276484156f323a2049eeffb14fefc61ccdcb8d\"" Apr 12 18:53:22.761000 env[1067]: time="2024-04-12T18:53:22.760941599Z" level=info msg="CreateContainer within sandbox \"0a2c366767e6870b0d10f23270276484156f323a2049eeffb14fefc61ccdcb8d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:53:22.767293 env[1067]: time="2024-04-12T18:53:22.767253222Z" level=info msg="CreateContainer within sandbox \"60bc441b5ff299ae306fcab4ad8f7f8f03eb0cde3dcb10bd0bf9e8d6759e9bd4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1fae341f85fce9fd113ef8541b8340c821d66c65197a8036f795d6187df8e57c\"" Apr 12 18:53:22.769334 env[1067]: time="2024-04-12T18:53:22.768324428Z" level=info msg="StartContainer for \"1fae341f85fce9fd113ef8541b8340c821d66c65197a8036f795d6187df8e57c\"" Apr 12 18:53:22.785630 env[1067]: time="2024-04-12T18:53:22.785589536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal,Uid:ebac0cd64ff08ad046a5247c7e72fd56,Namespace:kube-system,Attempt:0,} returns sandbox id \"8904ac64a6369aefeadcd4df89e562da0f36a580b1d355133d13f1d10597d0d3\"" Apr 12 18:53:22.790191 env[1067]: time="2024-04-12T18:53:22.790119407Z" level=info msg="CreateContainer within sandbox \"8904ac64a6369aefeadcd4df89e562da0f36a580b1d355133d13f1d10597d0d3\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:53:22.800333 env[1067]: time="2024-04-12T18:53:22.800268959Z" level=info msg="CreateContainer within sandbox \"0a2c366767e6870b0d10f23270276484156f323a2049eeffb14fefc61ccdcb8d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4cf758870e73b0f8ee8cec414806597a99584b72369cdab27690d860bbbaca51\"" Apr 12 18:53:22.800890 env[1067]: time="2024-04-12T18:53:22.800859290Z" level=info msg="StartContainer for \"4cf758870e73b0f8ee8cec414806597a99584b72369cdab27690d860bbbaca51\"" Apr 12 18:53:22.805948 systemd[1]: Started cri-containerd-1fae341f85fce9fd113ef8541b8340c821d66c65197a8036f795d6187df8e57c.scope. Apr 12 18:53:22.818946 kubelet[1590]: I0412 18:53:22.817806 1590 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:22.818946 kubelet[1590]: E0412 18:53:22.818351 1590 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.50:6443/api/v1/nodes\": dial tcp 172.24.4.50:6443: connect: connection refused" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.824000 audit: BPF prog-id=79 op=LOAD Apr 12 18:53:22.826000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.826000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1659 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166616533343166383566636539666431313365663835343162383334 Apr 12 18:53:22.826000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.826000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1659 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166616533343166383566636539666431313365663835343162383334 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit: BPF prog-id=80 op=LOAD Apr 12 18:53:22.829000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020fc00 items=0 ppid=1659 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166616533343166383566636539666431313365663835343162383334 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.829000 audit: BPF prog-id=81 op=LOAD Apr 12 18:53:22.829000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020fc48 items=0 ppid=1659 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166616533343166383566636539666431313365663835343162383334 Apr 12 18:53:22.830000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:53:22.830000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.830000 audit: BPF prog-id=82 op=LOAD Apr 12 18:53:22.830000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027e058 items=0 ppid=1659 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166616533343166383566636539666431313365663835343162383334 Apr 12 18:53:22.841191 systemd[1]: Started cri-containerd-4cf758870e73b0f8ee8cec414806597a99584b72369cdab27690d860bbbaca51.scope. Apr 12 18:53:22.857491 env[1067]: time="2024-04-12T18:53:22.857443833Z" level=info msg="CreateContainer within sandbox \"8904ac64a6369aefeadcd4df89e562da0f36a580b1d355133d13f1d10597d0d3\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"412c9b25cb215397352fba60f5877f4297f445912fa04d51a92dd757ccc08b19\"" Apr 12 18:53:22.858113 env[1067]: time="2024-04-12T18:53:22.858081122Z" level=info msg="StartContainer for \"412c9b25cb215397352fba60f5877f4297f445912fa04d51a92dd757ccc08b19\"" Apr 12 18:53:22.875686 env[1067]: time="2024-04-12T18:53:22.875237626Z" level=info msg="StartContainer for \"1fae341f85fce9fd113ef8541b8340c821d66c65197a8036f795d6187df8e57c\" returns successfully" Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit: BPF prog-id=83 op=LOAD Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1699 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663735383837306537336230663865653863656334313438303635 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1699 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663735383837306537336230663865653863656334313438303635 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit: BPF prog-id=84 op=LOAD Apr 12 18:53:22.877000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cc9a0 items=0 ppid=1699 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663735383837306537336230663865653863656334313438303635 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.877000 audit: BPF prog-id=85 op=LOAD Apr 12 18:53:22.877000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cc9e8 items=0 ppid=1699 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663735383837306537336230663865653863656334313438303635 Apr 12 18:53:22.879000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:53:22.879000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.879000 audit: BPF prog-id=86 op=LOAD Apr 12 18:53:22.879000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ccdf8 items=0 ppid=1699 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663735383837306537336230663865653863656334313438303635 Apr 12 18:53:22.890946 kubelet[1590]: W0412 18:53:22.889965 1590 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.24.4.50:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.890946 kubelet[1590]: E0412 18:53:22.890117 1590 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.50:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.50:6443: connect: connection refused Apr 12 18:53:22.899992 systemd[1]: Started cri-containerd-412c9b25cb215397352fba60f5877f4297f445912fa04d51a92dd757ccc08b19.scope. Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.923000 audit: BPF prog-id=87 op=LOAD Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=1643 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326339623235636232313533393733353266626136306635383737 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=8 items=0 ppid=1643 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326339623235636232313533393733353266626136306635383737 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit: BPF prog-id=88 op=LOAD Apr 12 18:53:22.925000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c00030a280 items=0 ppid=1643 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326339623235636232313533393733353266626136306635383737 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.925000 audit: BPF prog-id=89 op=LOAD Apr 12 18:53:22.925000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c00030a2c8 items=0 ppid=1643 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326339623235636232313533393733353266626136306635383737 Apr 12 18:53:22.925000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:53:22.925000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:22.926000 audit: BPF prog-id=90 op=LOAD Apr 12 18:53:22.926000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c00030a6d8 items=0 ppid=1643 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:22.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326339623235636232313533393733353266626136306635383737 Apr 12 18:53:22.943392 env[1067]: time="2024-04-12T18:53:22.943311984Z" level=info msg="StartContainer for \"4cf758870e73b0f8ee8cec414806597a99584b72369cdab27690d860bbbaca51\" returns successfully" Apr 12 18:53:22.980783 env[1067]: time="2024-04-12T18:53:22.980620155Z" level=info msg="StartContainer for \"412c9b25cb215397352fba60f5877f4297f445912fa04d51a92dd757ccc08b19\" returns successfully" Apr 12 18:53:24.420733 kubelet[1590]: I0412 18:53:24.420697 1590 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:24.590000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.590000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004c9020 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:24.590000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:24.590000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.590000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e5c040 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:24.590000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:24.898000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.898000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0067582a0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.898000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:24.899000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.899000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c008477600 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:24.899000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.899000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004207ce0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:24.919000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.919000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c004207fb0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:24.941000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.941000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006d59be0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.941000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:24.949000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:24.949000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c006758cc0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:53:24.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:53:25.125879 kubelet[1590]: I0412 18:53:25.125838 1590 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:25.144885 kubelet[1590]: E0412 18:53:25.144853 1590 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-3-d-76b1f6eb3d.novalocal\" not found" Apr 12 18:53:25.245796 kubelet[1590]: E0412 18:53:25.245694 1590 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-3-d-76b1f6eb3d.novalocal\" not found" Apr 12 18:53:25.282559 kubelet[1590]: I0412 18:53:25.282525 1590 apiserver.go:52] "Watching apiserver" Apr 12 18:53:25.303321 kubelet[1590]: I0412 18:53:25.303297 1590 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:28.047061 kubelet[1590]: W0412 18:53:28.047005 1590 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:53:28.442740 systemd[1]: Reloading. Apr 12 18:53:28.591090 /usr/lib/systemd/system-generators/torcx-generator[1897]: time="2024-04-12T18:53:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:28.591142 /usr/lib/systemd/system-generators/torcx-generator[1897]: time="2024-04-12T18:53:28Z" level=info msg="torcx already run" Apr 12 18:53:28.717765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:28.717787 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:28.750794 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.844399 kernel: kauditd_printk_skb: 725 callbacks suppressed Apr 12 18:53:28.844566 kernel: audit: type=1400 audit(1712948008.842:633): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852156 kernel: audit: type=1400 audit(1712948008.842:634): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870642 kernel: audit: type=1400 audit(1712948008.852:635): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870889 kernel: audit: type=1400 audit(1712948008.852:636): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.881371 kernel: audit: type=1400 audit(1712948008.852:637): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.889987 kernel: audit: type=1400 audit(1712948008.852:638): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.890118 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.899144 kernel: audit: type=1400 audit(1712948008.852:639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.899292 kernel: audit: audit_lost=74 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.909816 kernel: audit: type=1400 audit(1712948008.852:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit: BPF prog-id=91 op=LOAD Apr 12 18:53:28.852000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit: BPF prog-id=92 op=LOAD Apr 12 18:53:28.861000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit: BPF prog-id=93 op=LOAD Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.869000 audit: BPF prog-id=94 op=LOAD Apr 12 18:53:28.869000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:53:28.869000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit: BPF prog-id=95 op=LOAD Apr 12 18:53:28.871000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.879000 audit: BPF prog-id=96 op=LOAD Apr 12 18:53:28.879000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:53:28.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.911000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit: BPF prog-id=101 op=LOAD Apr 12 18:53:28.913000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit: BPF prog-id=104 op=LOAD Apr 12 18:53:28.916000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.916000 audit: BPF prog-id=105 op=LOAD Apr 12 18:53:28.916000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit: BPF prog-id=106 op=LOAD Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.917000 audit: BPF prog-id=107 op=LOAD Apr 12 18:53:28.917000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:53:28.917000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit: BPF prog-id=108 op=LOAD Apr 12 18:53:28.919000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.919000 audit: BPF prog-id=109 op=LOAD Apr 12 18:53:28.920000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.922000 audit: BPF prog-id=110 op=LOAD Apr 12 18:53:28.922000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:28.924000 audit: BPF prog-id=111 op=LOAD Apr 12 18:53:28.924000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:53:28.943380 kubelet[1590]: I0412 18:53:28.943333 1590 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:28.943754 systemd[1]: Stopping kubelet.service... Apr 12 18:53:28.967255 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:53:28.967463 systemd[1]: Stopped kubelet.service. Apr 12 18:53:28.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:28.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:28.969437 systemd[1]: Started kubelet.service. Apr 12 18:53:29.052136 kubelet[1941]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:29.052468 kubelet[1941]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:29.052543 kubelet[1941]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:29.052684 kubelet[1941]: I0412 18:53:29.052657 1941 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:29.057709 kubelet[1941]: I0412 18:53:29.057683 1941 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:29.057844 kubelet[1941]: I0412 18:53:29.057833 1941 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:29.058195 kubelet[1941]: I0412 18:53:29.058178 1941 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:29.060260 kubelet[1941]: I0412 18:53:29.060244 1941 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:53:29.063228 kubelet[1941]: I0412 18:53:29.063211 1941 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:29.071852 kubelet[1941]: I0412 18:53:29.071827 1941 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:29.072210 kubelet[1941]: I0412 18:53:29.072196 1941 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:29.072495 kubelet[1941]: I0412 18:53:29.072477 1941 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:29.072658 kubelet[1941]: I0412 18:53:29.072644 1941 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:29.072733 kubelet[1941]: I0412 18:53:29.072722 1941 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:29.072869 kubelet[1941]: I0412 18:53:29.072857 1941 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:29.073068 kubelet[1941]: I0412 18:53:29.073054 1941 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:29.073160 kubelet[1941]: I0412 18:53:29.073148 1941 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:29.073374 kubelet[1941]: I0412 18:53:29.073361 1941 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:29.073449 kubelet[1941]: I0412 18:53:29.073439 1941 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:29.075206 kubelet[1941]: I0412 18:53:29.074951 1941 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:29.075206 kubelet[1941]: I0412 18:53:29.075138 1941 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:29.075785 kubelet[1941]: I0412 18:53:29.075763 1941 server.go:1256] "Started kubelet" Apr 12 18:53:29.088000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.088000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:29.088000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000daa3c0 a1=c000b69f38 a2=c000daa390 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:29.088000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:29.089000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.089000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:29.089000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf0260 a1=c000b69f50 a2=c000daa450 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:29.089000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:29.090427 kubelet[1941]: I0412 18:53:29.089972 1941 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:29.090427 kubelet[1941]: I0412 18:53:29.090030 1941 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:29.090427 kubelet[1941]: I0412 18:53:29.090063 1941 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:29.105242 kubelet[1941]: I0412 18:53:29.105179 1941 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:29.109832 kubelet[1941]: I0412 18:53:29.109775 1941 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:29.116173 kubelet[1941]: I0412 18:53:29.113206 1941 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:29.116173 kubelet[1941]: I0412 18:53:29.113357 1941 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:29.117266 kubelet[1941]: I0412 18:53:29.117246 1941 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:29.135888 kubelet[1941]: I0412 18:53:29.132494 1941 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:29.135888 kubelet[1941]: I0412 18:53:29.132647 1941 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:29.135888 kubelet[1941]: I0412 18:53:29.135073 1941 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:29.136936 kubelet[1941]: I0412 18:53:29.136900 1941 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:29.136999 kubelet[1941]: I0412 18:53:29.136956 1941 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:29.136999 kubelet[1941]: I0412 18:53:29.136976 1941 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:29.137054 kubelet[1941]: E0412 18:53:29.137021 1941 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:29.140191 kubelet[1941]: I0412 18:53:29.140162 1941 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:29.146398 kubelet[1941]: E0412 18:53:29.146375 1941 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:29.146672 kubelet[1941]: I0412 18:53:29.146658 1941 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:29.146741 kubelet[1941]: I0412 18:53:29.146732 1941 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:29.209966 kubelet[1941]: I0412 18:53:29.209941 1941 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:29.210341 kubelet[1941]: I0412 18:53:29.210311 1941 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:29.210394 kubelet[1941]: I0412 18:53:29.210345 1941 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:29.210583 kubelet[1941]: I0412 18:53:29.210565 1941 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:53:29.210627 kubelet[1941]: I0412 18:53:29.210599 1941 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:53:29.210627 kubelet[1941]: I0412 18:53:29.210608 1941 policy_none.go:49] "None policy: Start" Apr 12 18:53:29.217603 kubelet[1941]: I0412 18:53:29.217583 1941 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:29.217603 kubelet[1941]: I0412 18:53:29.217605 1941 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:29.218579 kubelet[1941]: I0412 18:53:29.218551 1941 state_mem.go:75] "Updated machine memory state" Apr 12 18:53:29.222749 kubelet[1941]: I0412 18:53:29.222731 1941 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.227055 kubelet[1941]: I0412 18:53:29.226951 1941 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:29.227000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:29.227000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:29.227000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b8a780 a1=c000fd1440 a2=c000b8a750 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:29.227000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:29.230185 kubelet[1941]: I0412 18:53:29.229527 1941 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:29.233342 kubelet[1941]: I0412 18:53:29.232735 1941 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:29.237846 kubelet[1941]: I0412 18:53:29.237188 1941 topology_manager.go:215] "Topology Admit Handler" podUID="ebac0cd64ff08ad046a5247c7e72fd56" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.237846 kubelet[1941]: I0412 18:53:29.237275 1941 topology_manager.go:215] "Topology Admit Handler" podUID="00c73de132e45faeaa33b0728f39ca8d" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.237846 kubelet[1941]: I0412 18:53:29.237332 1941 topology_manager.go:215] "Topology Admit Handler" podUID="f01d70932301641230e8e473ed0a1b28" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.252358 kubelet[1941]: I0412 18:53:29.252331 1941 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.252529 kubelet[1941]: I0412 18:53:29.252400 1941 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.257119 kubelet[1941]: W0412 18:53:29.257089 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:53:29.260212 kubelet[1941]: W0412 18:53:29.260176 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:53:29.260698 kubelet[1941]: W0412 18:53:29.260687 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:53:29.260851 kubelet[1941]: E0412 18:53:29.260824 1941 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.434374 kubelet[1941]: I0412 18:53:29.434318 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.434675 kubelet[1941]: I0412 18:53:29.434660 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.434816 kubelet[1941]: I0412 18:53:29.434804 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.434996 kubelet[1941]: I0412 18:53:29.434982 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.435208 kubelet[1941]: I0412 18:53:29.435187 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.435386 kubelet[1941]: I0412 18:53:29.435359 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.435518 kubelet[1941]: I0412 18:53:29.435506 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/00c73de132e45faeaa33b0728f39ca8d-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"00c73de132e45faeaa33b0728f39ca8d\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.435655 kubelet[1941]: I0412 18:53:29.435641 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f01d70932301641230e8e473ed0a1b28-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"f01d70932301641230e8e473ed0a1b28\") " pod="kube-system/kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.435854 kubelet[1941]: I0412 18:53:29.435817 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ebac0cd64ff08ad046a5247c7e72fd56-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal\" (UID: \"ebac0cd64ff08ad046a5247c7e72fd56\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:53:29.491000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:29.491000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000adc660 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:29.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:29.493000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:29.493000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000adc820 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:29.493000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:29.496000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:29.496000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5d6a0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:29.496000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:29.496000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:29.496000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5d6e0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:29.496000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:30.085048 kubelet[1941]: I0412 18:53:30.085007 1941 apiserver.go:52] "Watching apiserver" Apr 12 18:53:30.133020 kubelet[1941]: I0412 18:53:30.132981 1941 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:30.348038 kubelet[1941]: I0412 18:53:30.347901 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-3-d-76b1f6eb3d.novalocal" podStartSLOduration=1.347839644 podStartE2EDuration="1.347839644s" podCreationTimestamp="2024-04-12 18:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:30.346289912 +0000 UTC m=+1.363185795" watchObservedRunningTime="2024-04-12 18:53:30.347839644 +0000 UTC m=+1.364735496" Apr 12 18:53:30.348038 kubelet[1941]: I0412 18:53:30.348026 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-3-d-76b1f6eb3d.novalocal" podStartSLOduration=1.348004214 podStartE2EDuration="1.348004214s" podCreationTimestamp="2024-04-12 18:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:30.299828658 +0000 UTC m=+1.316724520" watchObservedRunningTime="2024-04-12 18:53:30.348004214 +0000 UTC m=+1.364900066" Apr 12 18:53:30.368960 kubelet[1941]: I0412 18:53:30.368903 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-3-d-76b1f6eb3d.novalocal" podStartSLOduration=2.368865359 podStartE2EDuration="2.368865359s" podCreationTimestamp="2024-04-12 18:53:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:30.358387202 +0000 UTC m=+1.375283054" watchObservedRunningTime="2024-04-12 18:53:30.368865359 +0000 UTC m=+1.385761201" Apr 12 18:53:34.200601 sudo[1199]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:34.199000 audit[1199]: USER_END pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:34.203500 kernel: kauditd_printk_skb: 362 callbacks suppressed Apr 12 18:53:34.203574 kernel: audit: type=1106 audit(1712948014.199:835): pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:34.199000 audit[1199]: CRED_DISP pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:34.222317 kernel: audit: type=1104 audit(1712948014.199:836): pid=1199 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:34.419902 sshd[1195]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:34.421000 audit[1195]: USER_END pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:53:34.427288 systemd[1]: sshd@6-172.24.4.50:22-172.24.4.1:58932.service: Deactivated successfully. Apr 12 18:53:34.430008 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:53:34.430769 systemd[1]: session-7.scope: Consumed 6.881s CPU time. Apr 12 18:53:34.421000 audit[1195]: CRED_DISP pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:53:34.441126 systemd-logind[1049]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:53:34.444177 systemd-logind[1049]: Removed session 7. Apr 12 18:53:34.449461 kernel: audit: type=1106 audit(1712948014.421:837): pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:53:34.449622 kernel: audit: type=1104 audit(1712948014.421:838): pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:53:34.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.50:22-172.24.4.1:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:34.459845 kernel: audit: type=1131 audit(1712948014.421:839): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.50:22-172.24.4.1:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:40.732000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526950 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:53:40.732000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001150140 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:40.762458 kernel: audit: type=1400 audit(1712948020.732:840): avc: denied { watch } for pid=1780 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526950 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:53:40.762666 kernel: audit: type=1300 audit(1712948020.732:840): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001150140 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:53:40.762735 kernel: audit: type=1327 audit(1712948020.732:840): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:40.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.039250 kubelet[1941]: I0412 18:53:41.039100 1941 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:53:41.040225 env[1067]: time="2024-04-12T18:53:41.039632608Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:53:41.040643 kubelet[1941]: I0412 18:53:41.040008 1941 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:53:41.842294 kubelet[1941]: I0412 18:53:41.842217 1941 topology_manager.go:215] "Topology Admit Handler" podUID="61a8cf24-39be-45d6-917e-15eea0cd3f53" podNamespace="kube-system" podName="kube-proxy-86lkq" Apr 12 18:53:41.853419 systemd[1]: Created slice kubepods-besteffort-pod61a8cf24_39be_45d6_917e_15eea0cd3f53.slice. Apr 12 18:53:41.913177 kubelet[1941]: I0412 18:53:41.913128 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/61a8cf24-39be-45d6-917e-15eea0cd3f53-xtables-lock\") pod \"kube-proxy-86lkq\" (UID: \"61a8cf24-39be-45d6-917e-15eea0cd3f53\") " pod="kube-system/kube-proxy-86lkq" Apr 12 18:53:41.913663 kubelet[1941]: I0412 18:53:41.913630 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkb9j\" (UniqueName: \"kubernetes.io/projected/61a8cf24-39be-45d6-917e-15eea0cd3f53-kube-api-access-lkb9j\") pod \"kube-proxy-86lkq\" (UID: \"61a8cf24-39be-45d6-917e-15eea0cd3f53\") " pod="kube-system/kube-proxy-86lkq" Apr 12 18:53:41.914018 kubelet[1941]: I0412 18:53:41.913989 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/61a8cf24-39be-45d6-917e-15eea0cd3f53-kube-proxy\") pod \"kube-proxy-86lkq\" (UID: \"61a8cf24-39be-45d6-917e-15eea0cd3f53\") " pod="kube-system/kube-proxy-86lkq" Apr 12 18:53:41.914329 kubelet[1941]: I0412 18:53:41.914301 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/61a8cf24-39be-45d6-917e-15eea0cd3f53-lib-modules\") pod \"kube-proxy-86lkq\" (UID: \"61a8cf24-39be-45d6-917e-15eea0cd3f53\") " pod="kube-system/kube-proxy-86lkq" Apr 12 18:53:42.094144 kubelet[1941]: I0412 18:53:42.093003 1941 topology_manager.go:215] "Topology Admit Handler" podUID="772f32fb-14e3-411d-9fa4-22ca2d0a937c" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-jrc25" Apr 12 18:53:42.112954 systemd[1]: Created slice kubepods-besteffort-pod772f32fb_14e3_411d_9fa4_22ca2d0a937c.slice. Apr 12 18:53:42.115541 kubelet[1941]: I0412 18:53:42.115517 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/772f32fb-14e3-411d-9fa4-22ca2d0a937c-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-jrc25\" (UID: \"772f32fb-14e3-411d-9fa4-22ca2d0a937c\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jrc25" Apr 12 18:53:42.115703 kubelet[1941]: I0412 18:53:42.115691 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7vxf\" (UniqueName: \"kubernetes.io/projected/772f32fb-14e3-411d-9fa4-22ca2d0a937c-kube-api-access-j7vxf\") pod \"tigera-operator-6bfc79cb9c-jrc25\" (UID: \"772f32fb-14e3-411d-9fa4-22ca2d0a937c\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jrc25" Apr 12 18:53:42.168452 env[1067]: time="2024-04-12T18:53:42.168408387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-86lkq,Uid:61a8cf24-39be-45d6-917e-15eea0cd3f53,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:42.266397 env[1067]: time="2024-04-12T18:53:42.266071364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:42.266397 env[1067]: time="2024-04-12T18:53:42.266150162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:42.266397 env[1067]: time="2024-04-12T18:53:42.266176241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:42.272534 env[1067]: time="2024-04-12T18:53:42.266463942Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0 pid=2024 runtime=io.containerd.runc.v2 Apr 12 18:53:42.289646 systemd[1]: Started cri-containerd-904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0.scope. Apr 12 18:53:42.322569 kernel: audit: type=1400 audit(1712948022.314:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.322697 kernel: audit: type=1400 audit(1712948022.314:842): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.322724 kernel: audit: type=1400 audit(1712948022.314:843): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.326136 kernel: audit: type=1400 audit(1712948022.314:844): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.336074 kernel: audit: type=1400 audit(1712948022.314:845): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.340938 kernel: audit: type=1400 audit(1712948022.314:846): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.325000 audit: BPF prog-id=112 op=LOAD Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2024 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.345979 kernel: audit: type=1400 audit(1712948022.314:847): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930346333383933343962653365373636643333626561646536613563 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2024 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930346333383933343962653365373636643333626561646536613563 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit: BPF prog-id=113 op=LOAD Apr 12 18:53:42.329000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000317710 items=0 ppid=2024 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930346333383933343962653365373636643333626561646536613563 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit: BPF prog-id=114 op=LOAD Apr 12 18:53:42.329000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000317758 items=0 ppid=2024 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930346333383933343962653365373636643333626561646536613563 Apr 12 18:53:42.329000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:53:42.329000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.329000 audit: BPF prog-id=115 op=LOAD Apr 12 18:53:42.329000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000317b68 items=0 ppid=2024 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930346333383933343962653365373636643333626561646536613563 Apr 12 18:53:42.359613 env[1067]: time="2024-04-12T18:53:42.359562212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-86lkq,Uid:61a8cf24-39be-45d6-917e-15eea0cd3f53,Namespace:kube-system,Attempt:0,} returns sandbox id \"904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0\"" Apr 12 18:53:42.363894 env[1067]: time="2024-04-12T18:53:42.363865198Z" level=info msg="CreateContainer within sandbox \"904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:53:42.397972 env[1067]: time="2024-04-12T18:53:42.397904732Z" level=info msg="CreateContainer within sandbox \"904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2ab0db14825aa6d499a9914679d38cea4860cb9e04cc4d5cee555f6dfa2d17d9\"" Apr 12 18:53:42.398813 env[1067]: time="2024-04-12T18:53:42.398764106Z" level=info msg="StartContainer for \"2ab0db14825aa6d499a9914679d38cea4860cb9e04cc4d5cee555f6dfa2d17d9\"" Apr 12 18:53:42.418167 env[1067]: time="2024-04-12T18:53:42.418130618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jrc25,Uid:772f32fb-14e3-411d-9fa4-22ca2d0a937c,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:53:42.421976 systemd[1]: Started cri-containerd-2ab0db14825aa6d499a9914679d38cea4860cb9e04cc4d5cee555f6dfa2d17d9.scope. Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f18b4f60568 items=0 ppid=2024 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623064623134383235616136643439396139393134363739643338 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.444000 audit: BPF prog-id=116 op=LOAD Apr 12 18:53:42.444000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000404018 items=0 ppid=2024 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623064623134383235616136643439396139393134363739643338 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.446000 audit: BPF prog-id=117 op=LOAD Apr 12 18:53:42.446000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000404068 items=0 ppid=2024 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623064623134383235616136643439396139393134363739643338 Apr 12 18:53:42.447000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:53:42.447000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.447000 audit: BPF prog-id=118 op=LOAD Apr 12 18:53:42.447000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0004040f8 items=0 ppid=2024 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623064623134383235616136643439396139393134363739643338 Apr 12 18:53:42.468765 env[1067]: time="2024-04-12T18:53:42.468624988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:42.469068 env[1067]: time="2024-04-12T18:53:42.469042302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:42.469239 env[1067]: time="2024-04-12T18:53:42.469149663Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:42.469678 env[1067]: time="2024-04-12T18:53:42.469634373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8f08d65caa846e9c1dbe4e78d93aa4eb73ab95937c1828c32e6ed6d112fa924 pid=2099 runtime=io.containerd.runc.v2 Apr 12 18:53:42.473144 env[1067]: time="2024-04-12T18:53:42.473107362Z" level=info msg="StartContainer for \"2ab0db14825aa6d499a9914679d38cea4860cb9e04cc4d5cee555f6dfa2d17d9\" returns successfully" Apr 12 18:53:42.488197 systemd[1]: Started cri-containerd-e8f08d65caa846e9c1dbe4e78d93aa4eb73ab95937c1828c32e6ed6d112fa924.scope. Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.507000 audit: BPF prog-id=119 op=LOAD Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2099 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663038643635636161383436653963316462653465373864393361 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2099 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663038643635636161383436653963316462653465373864393361 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit: BPF prog-id=120 op=LOAD Apr 12 18:53:42.508000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000309040 items=0 ppid=2099 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663038643635636161383436653963316462653465373864393361 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit: BPF prog-id=121 op=LOAD Apr 12 18:53:42.508000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000309088 items=0 ppid=2099 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663038643635636161383436653963316462653465373864393361 Apr 12 18:53:42.508000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:53:42.508000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:42.508000 audit: BPF prog-id=122 op=LOAD Apr 12 18:53:42.508000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000309498 items=0 ppid=2099 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663038643635636161383436653963316462653465373864393361 Apr 12 18:53:42.544043 env[1067]: time="2024-04-12T18:53:42.543998578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jrc25,Uid:772f32fb-14e3-411d-9fa4-22ca2d0a937c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e8f08d65caa846e9c1dbe4e78d93aa4eb73ab95937c1828c32e6ed6d112fa924\"" Apr 12 18:53:42.546229 env[1067]: time="2024-04-12T18:53:42.546193368Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:53:42.596000 audit[2160]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.596000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9f05f210 a2=0 a3=7fff9f05f1fc items=0 ppid=2079 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:42.598000 audit[2162]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.598000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffca790e50 a2=0 a3=7fffca790e3c items=0 ppid=2079 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:42.599000 audit[2163]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.599000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff54fc4c90 a2=0 a3=7fff54fc4c7c items=0 ppid=2079 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:42.601000 audit[2161]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.601000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86fa7dc0 a2=0 a3=7ffc86fa7dac items=0 ppid=2079 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:42.613000 audit[2165]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.613000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea8130350 a2=0 a3=7ffea813033c items=0 ppid=2079 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:42.616000 audit[2166]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.616000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfc35cf40 a2=0 a3=7ffdfc35cf2c items=0 ppid=2079 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:42.706000 audit[2167]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.706000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff1d391820 a2=0 a3=7fff1d39180c items=0 ppid=2079 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:42.716000 audit[2169]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.716000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcc1025590 a2=0 a3=7ffcc102557c items=0 ppid=2079 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:53:42.728000 audit[2172]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.728000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe8c180410 a2=0 a3=7ffe8c1803fc items=0 ppid=2079 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:53:42.731000 audit[2173]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.731000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcf6ccf50 a2=0 a3=7fffcf6ccf3c items=0 ppid=2079 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:42.737000 audit[2175]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.737000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd61ec3ff0 a2=0 a3=7ffd61ec3fdc items=0 ppid=2079 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:42.741000 audit[2176]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.741000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6d8b1540 a2=0 a3=7fff6d8b152c items=0 ppid=2079 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:42.748000 audit[2178]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.748000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc12971480 a2=0 a3=7ffc1297146c items=0 ppid=2079 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:42.758000 audit[2181]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.758000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe95aaa020 a2=0 a3=7ffe95aaa00c items=0 ppid=2079 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:53:42.761000 audit[2182]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.761000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd453dc8d0 a2=0 a3=7ffd453dc8bc items=0 ppid=2079 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:42.768000 audit[2184]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.768000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc932fbdf0 a2=0 a3=7ffc932fbddc items=0 ppid=2079 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:42.771000 audit[2185]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.771000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdddd9e5f0 a2=0 a3=7ffdddd9e5dc items=0 ppid=2079 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:42.777000 audit[2187]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.777000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff45fbb770 a2=0 a3=7fff45fbb75c items=0 ppid=2079 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:42.787000 audit[2190]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.787000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebf8d4680 a2=0 a3=7ffebf8d466c items=0 ppid=2079 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:42.796000 audit[2193]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.796000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff037f0ff0 a2=0 a3=7fff037f0fdc items=0 ppid=2079 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:42.799000 audit[2194]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.799000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd087de6e0 a2=0 a3=7ffd087de6cc items=0 ppid=2079 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:42.808000 audit[2196]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.808000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd8d505810 a2=0 a3=7ffd8d5057fc items=0 ppid=2079 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:42.817000 audit[2199]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.817000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea0f78480 a2=0 a3=7ffea0f7846c items=0 ppid=2079 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:42.818000 audit[2200]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.818000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9d0f7020 a2=0 a3=7ffc9d0f700c items=0 ppid=2079 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:42.821000 audit[2202]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:42.821000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffed3ab9400 a2=0 a3=7ffed3ab93ec items=0 ppid=2079 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:42.860000 audit[2208]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:42.860000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe722062a0 a2=0 a3=7ffe7220628c items=0 ppid=2079 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:42.876000 audit[2208]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:42.876000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe722062a0 a2=0 a3=7ffe7220628c items=0 ppid=2079 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:42.878000 audit[2213]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.878000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe40207c50 a2=0 a3=7ffe40207c3c items=0 ppid=2079 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:42.883000 audit[2215]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.883000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd8e417750 a2=0 a3=7ffd8e41773c items=0 ppid=2079 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:53:42.888000 audit[2218]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.888000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0a0c3900 a2=0 a3=7ffd0a0c38ec items=0 ppid=2079 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:53:42.890000 audit[2219]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.890000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7bda94a0 a2=0 a3=7ffe7bda948c items=0 ppid=2079 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:42.894000 audit[2221]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.894000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3cf90220 a2=0 a3=7ffd3cf9020c items=0 ppid=2079 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:42.896000 audit[2222]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.896000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc48ae8ec0 a2=0 a3=7ffc48ae8eac items=0 ppid=2079 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:42.899000 audit[2224]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.899000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd585ed90 a2=0 a3=7fffd585ed7c items=0 ppid=2079 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:53:42.904000 audit[2227]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.904000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcff66cb90 a2=0 a3=7ffcff66cb7c items=0 ppid=2079 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:42.905000 audit[2228]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.905000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd282f5c10 a2=0 a3=7ffd282f5bfc items=0 ppid=2079 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:42.909000 audit[2230]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.909000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed19f3aa0 a2=0 a3=7ffed19f3a8c items=0 ppid=2079 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:42.911000 audit[2231]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.911000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0fb5a8e0 a2=0 a3=7ffe0fb5a8cc items=0 ppid=2079 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:42.918000 audit[2233]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.918000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed0f21ea0 a2=0 a3=7ffed0f21e8c items=0 ppid=2079 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:42.925000 audit[2236]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.925000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc623b8600 a2=0 a3=7ffc623b85ec items=0 ppid=2079 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:42.932000 audit[2239]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.932000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff25351de0 a2=0 a3=7fff25351dcc items=0 ppid=2079 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.932000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:53:42.934000 audit[2240]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.934000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd9730570 a2=0 a3=7fffd973055c items=0 ppid=2079 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:42.940000 audit[2242]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.940000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc47128d90 a2=0 a3=7ffc47128d7c items=0 ppid=2079 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:42.948000 audit[2245]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.948000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff97b1f7a0 a2=0 a3=7fff97b1f78c items=0 ppid=2079 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:42.950000 audit[2246]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.950000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff94ee6b20 a2=0 a3=7fff94ee6b0c items=0 ppid=2079 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:42.952000 audit[2248]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.952000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc13b0a1b0 a2=0 a3=7ffc13b0a19c items=0 ppid=2079 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:42.954000 audit[2249]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.954000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc70f61eb0 a2=0 a3=7ffc70f61e9c items=0 ppid=2079 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:42.958000 audit[2251]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.958000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1cd03690 a2=0 a3=7fff1cd0367c items=0 ppid=2079 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:42.967000 audit[2254]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:42.967000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc855b2c0 a2=0 a3=7ffcc855b2ac items=0 ppid=2079 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:42.972000 audit[2256]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:42.972000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffde871a3a0 a2=0 a3=7ffde871a38c items=0 ppid=2079 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.972000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:42.972000 audit[2256]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:42.972000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffde871a3a0 a2=0 a3=7ffde871a38c items=0 ppid=2079 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:42.972000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:43.106810 systemd[1]: run-containerd-runc-k8s.io-904c389349be3e766d33beade6a5cc409e053af8b7c5628dd426db1f83e8d6d0-runc.aNLeON.mount: Deactivated successfully. Apr 12 18:53:46.089055 env[1067]: time="2024-04-12T18:53:46.088990750Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:46.093046 env[1067]: time="2024-04-12T18:53:46.093022987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:46.097501 env[1067]: time="2024-04-12T18:53:46.097472818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:46.104495 env[1067]: time="2024-04-12T18:53:46.104432379Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:46.107955 env[1067]: time="2024-04-12T18:53:46.106661212Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:53:46.112184 env[1067]: time="2024-04-12T18:53:46.112124024Z" level=info msg="CreateContainer within sandbox \"e8f08d65caa846e9c1dbe4e78d93aa4eb73ab95937c1828c32e6ed6d112fa924\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:53:46.141225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2378422507.mount: Deactivated successfully. Apr 12 18:53:46.143242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount303693214.mount: Deactivated successfully. Apr 12 18:53:46.150480 env[1067]: time="2024-04-12T18:53:46.150442366Z" level=info msg="CreateContainer within sandbox \"e8f08d65caa846e9c1dbe4e78d93aa4eb73ab95937c1828c32e6ed6d112fa924\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e4341340a7843825f63d81ee921e8c5ee554b366ff59df9d4bd4974d44e90abd\"" Apr 12 18:53:46.151316 env[1067]: time="2024-04-12T18:53:46.151292902Z" level=info msg="StartContainer for \"e4341340a7843825f63d81ee921e8c5ee554b366ff59df9d4bd4974d44e90abd\"" Apr 12 18:53:46.190339 systemd[1]: Started cri-containerd-e4341340a7843825f63d81ee921e8c5ee554b366ff59df9d4bd4974d44e90abd.scope. Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.206371 kernel: kauditd_printk_skb: 303 callbacks suppressed Apr 12 18:53:46.206439 kernel: audit: type=1400 audit(1712948026.203:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213888 kernel: audit: type=1400 audit(1712948026.203:935): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.220972 kernel: audit: type=1400 audit(1712948026.203:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.225258 kernel: audit: type=1400 audit(1712948026.203:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.225340 kernel: audit: type=1400 audit(1712948026.203:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.232994 kernel: audit: type=1400 audit(1712948026.203:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.233055 kernel: audit: type=1400 audit(1712948026.203:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.244242 kernel: audit: type=1400 audit(1712948026.203:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.253765 kernel: audit: type=1400 audit(1712948026.203:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.253827 kernel: audit: type=1400 audit(1712948026.204:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit: BPF prog-id=123 op=LOAD Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2099 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534333431333430613738343338323566363364383165653932316538 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2099 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534333431333430613738343338323566363364383165653932316538 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.204000 audit: BPF prog-id=124 op=LOAD Apr 12 18:53:46.204000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024bf0 items=0 ppid=2099 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534333431333430613738343338323566363364383165653932316538 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.209000 audit: BPF prog-id=125 op=LOAD Apr 12 18:53:46.209000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024c38 items=0 ppid=2099 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534333431333430613738343338323566363364383165653932316538 Apr 12 18:53:46.213000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:53:46.213000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.213000 audit: BPF prog-id=126 op=LOAD Apr 12 18:53:46.213000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025048 items=0 ppid=2099 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534333431333430613738343338323566363364383165653932316538 Apr 12 18:53:46.267391 env[1067]: time="2024-04-12T18:53:46.267338945Z" level=info msg="StartContainer for \"e4341340a7843825f63d81ee921e8c5ee554b366ff59df9d4bd4974d44e90abd\" returns successfully" Apr 12 18:53:47.255005 kubelet[1941]: I0412 18:53:47.254883 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-86lkq" podStartSLOduration=6.254795904 podStartE2EDuration="6.254795904s" podCreationTimestamp="2024-04-12 18:53:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:43.236201746 +0000 UTC m=+14.253097648" watchObservedRunningTime="2024-04-12 18:53:47.254795904 +0000 UTC m=+18.271691797" Apr 12 18:53:48.539000 audit[2299]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:48.539000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcaf7f5e80 a2=0 a3=7ffcaf7f5e6c items=0 ppid=2079 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:48.540000 audit[2299]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:48.540000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcaf7f5e80 a2=0 a3=0 items=0 ppid=2079 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:48.549000 audit[2301]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:48.549000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd58a1ae30 a2=0 a3=7ffd58a1ae1c items=0 ppid=2079 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:48.550000 audit[2301]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:48.550000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd58a1ae30 a2=0 a3=0 items=0 ppid=2079 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:48.684276 kubelet[1941]: I0412 18:53:48.684212 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-jrc25" podStartSLOduration=3.121121396 podStartE2EDuration="6.684116131s" podCreationTimestamp="2024-04-12 18:53:42 +0000 UTC" firstStartedPulling="2024-04-12 18:53:42.54545363 +0000 UTC m=+13.562349472" lastFinishedPulling="2024-04-12 18:53:46.108448315 +0000 UTC m=+17.125344207" observedRunningTime="2024-04-12 18:53:47.262562018 +0000 UTC m=+18.279457910" watchObservedRunningTime="2024-04-12 18:53:48.684116131 +0000 UTC m=+19.701012023" Apr 12 18:53:48.684674 kubelet[1941]: I0412 18:53:48.684455 1941 topology_manager.go:215] "Topology Admit Handler" podUID="ffabe3d4-da49-4272-b81f-362c2234a074" podNamespace="calico-system" podName="calico-typha-68dc8f7f54-5j7f5" Apr 12 18:53:48.693891 systemd[1]: Created slice kubepods-besteffort-podffabe3d4_da49_4272_b81f_362c2234a074.slice. Apr 12 18:53:48.782350 kubelet[1941]: I0412 18:53:48.782307 1941 topology_manager.go:215] "Topology Admit Handler" podUID="ede6d1e3-1288-4bb7-ad13-4f551a990f79" podNamespace="calico-system" podName="calico-node-pf8k4" Apr 12 18:53:48.787815 systemd[1]: Created slice kubepods-besteffort-podede6d1e3_1288_4bb7_ad13_4f551a990f79.slice. Apr 12 18:53:48.866662 kubelet[1941]: I0412 18:53:48.866614 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8jhn\" (UniqueName: \"kubernetes.io/projected/ffabe3d4-da49-4272-b81f-362c2234a074-kube-api-access-l8jhn\") pod \"calico-typha-68dc8f7f54-5j7f5\" (UID: \"ffabe3d4-da49-4272-b81f-362c2234a074\") " pod="calico-system/calico-typha-68dc8f7f54-5j7f5" Apr 12 18:53:48.866662 kubelet[1941]: I0412 18:53:48.866677 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-cni-net-dir\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.866869 kubelet[1941]: I0412 18:53:48.866704 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-lib-modules\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.866869 kubelet[1941]: I0412 18:53:48.866733 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ede6d1e3-1288-4bb7-ad13-4f551a990f79-tigera-ca-bundle\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.866869 kubelet[1941]: I0412 18:53:48.866758 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-policysync\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.866869 kubelet[1941]: I0412 18:53:48.866784 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-var-run-calico\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.866869 kubelet[1941]: I0412 18:53:48.866808 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-cni-log-dir\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867050 kubelet[1941]: I0412 18:53:48.866849 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-flexvol-driver-host\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867050 kubelet[1941]: I0412 18:53:48.866874 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-xtables-lock\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867050 kubelet[1941]: I0412 18:53:48.866900 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ede6d1e3-1288-4bb7-ad13-4f551a990f79-node-certs\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867050 kubelet[1941]: I0412 18:53:48.866951 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-var-lib-calico\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867050 kubelet[1941]: I0412 18:53:48.866984 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ede6d1e3-1288-4bb7-ad13-4f551a990f79-cni-bin-dir\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867198 kubelet[1941]: I0412 18:53:48.867009 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pm4jv\" (UniqueName: \"kubernetes.io/projected/ede6d1e3-1288-4bb7-ad13-4f551a990f79-kube-api-access-pm4jv\") pod \"calico-node-pf8k4\" (UID: \"ede6d1e3-1288-4bb7-ad13-4f551a990f79\") " pod="calico-system/calico-node-pf8k4" Apr 12 18:53:48.867198 kubelet[1941]: I0412 18:53:48.867047 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ffabe3d4-da49-4272-b81f-362c2234a074-tigera-ca-bundle\") pod \"calico-typha-68dc8f7f54-5j7f5\" (UID: \"ffabe3d4-da49-4272-b81f-362c2234a074\") " pod="calico-system/calico-typha-68dc8f7f54-5j7f5" Apr 12 18:53:48.867198 kubelet[1941]: I0412 18:53:48.867073 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ffabe3d4-da49-4272-b81f-362c2234a074-typha-certs\") pod \"calico-typha-68dc8f7f54-5j7f5\" (UID: \"ffabe3d4-da49-4272-b81f-362c2234a074\") " pod="calico-system/calico-typha-68dc8f7f54-5j7f5" Apr 12 18:53:49.068797 kubelet[1941]: E0412 18:53:49.068756 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.069031 kubelet[1941]: W0412 18:53:49.068819 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.069031 kubelet[1941]: E0412 18:53:49.068867 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.069348 kubelet[1941]: E0412 18:53:49.069323 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.069348 kubelet[1941]: W0412 18:53:49.069346 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.069512 kubelet[1941]: E0412 18:53:49.069369 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.069681 kubelet[1941]: E0412 18:53:49.069658 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.069681 kubelet[1941]: W0412 18:53:49.069674 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.069816 kubelet[1941]: E0412 18:53:49.069696 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.069995 kubelet[1941]: E0412 18:53:49.069970 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.069995 kubelet[1941]: W0412 18:53:49.069992 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.070162 kubelet[1941]: E0412 18:53:49.070013 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.176064 kubelet[1941]: E0412 18:53:49.175801 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.176064 kubelet[1941]: W0412 18:53:49.175831 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.176064 kubelet[1941]: E0412 18:53:49.175865 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.176477 kubelet[1941]: E0412 18:53:49.176160 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.176477 kubelet[1941]: W0412 18:53:49.176176 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.176477 kubelet[1941]: E0412 18:53:49.176197 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.181000 kubelet[1941]: E0412 18:53:49.180630 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.181000 kubelet[1941]: W0412 18:53:49.180657 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.181000 kubelet[1941]: E0412 18:53:49.180682 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.183011 kubelet[1941]: E0412 18:53:49.182972 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.183011 kubelet[1941]: W0412 18:53:49.183004 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.183281 kubelet[1941]: E0412 18:53:49.183029 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.197956 kubelet[1941]: E0412 18:53:49.197858 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.197956 kubelet[1941]: W0412 18:53:49.197889 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.197956 kubelet[1941]: E0412 18:53:49.197952 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.198552 kubelet[1941]: E0412 18:53:49.198481 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.198552 kubelet[1941]: W0412 18:53:49.198508 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.198552 kubelet[1941]: E0412 18:53:49.198530 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.283885 kubelet[1941]: E0412 18:53:49.283848 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.284170 kubelet[1941]: W0412 18:53:49.284140 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.284323 kubelet[1941]: E0412 18:53:49.284301 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.284824 kubelet[1941]: E0412 18:53:49.284799 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.285035 kubelet[1941]: W0412 18:53:49.285007 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.285199 kubelet[1941]: E0412 18:53:49.285178 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.321971 kubelet[1941]: I0412 18:53:49.320497 1941 topology_manager.go:215] "Topology Admit Handler" podUID="fe9c7123-bb87-4352-a856-546b7767f031" podNamespace="calico-system" podName="csi-node-driver-86hdw" Apr 12 18:53:49.329452 kubelet[1941]: E0412 18:53:49.320949 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:49.373128 kubelet[1941]: E0412 18:53:49.373103 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.373307 kubelet[1941]: W0412 18:53:49.373290 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.373417 kubelet[1941]: E0412 18:53:49.373404 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.375365 kubelet[1941]: E0412 18:53:49.375338 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.375475 kubelet[1941]: W0412 18:53:49.375459 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.375572 kubelet[1941]: E0412 18:53:49.375560 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.385647 kubelet[1941]: E0412 18:53:49.385613 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.385806 kubelet[1941]: W0412 18:53:49.385782 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.385948 kubelet[1941]: E0412 18:53:49.385933 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.386238 kubelet[1941]: E0412 18:53:49.386226 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.386331 kubelet[1941]: W0412 18:53:49.386316 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.386432 kubelet[1941]: E0412 18:53:49.386421 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.386722 kubelet[1941]: E0412 18:53:49.386708 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.386835 kubelet[1941]: W0412 18:53:49.386821 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.386949 kubelet[1941]: E0412 18:53:49.386936 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.388612 kubelet[1941]: E0412 18:53:49.388596 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.388772 kubelet[1941]: W0412 18:53:49.388756 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.388875 kubelet[1941]: E0412 18:53:49.388864 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.389226 kubelet[1941]: E0412 18:53:49.389214 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.389324 kubelet[1941]: W0412 18:53:49.389310 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.389427 kubelet[1941]: E0412 18:53:49.389416 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.389789 kubelet[1941]: E0412 18:53:49.389778 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.389890 kubelet[1941]: W0412 18:53:49.389877 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.389993 kubelet[1941]: E0412 18:53:49.389982 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.390480 kubelet[1941]: E0412 18:53:49.390467 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.390582 kubelet[1941]: W0412 18:53:49.390556 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.390675 kubelet[1941]: E0412 18:53:49.390664 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.391028 kubelet[1941]: E0412 18:53:49.391016 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.391141 kubelet[1941]: W0412 18:53:49.391122 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.391227 kubelet[1941]: E0412 18:53:49.391217 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.391894 kubelet[1941]: E0412 18:53:49.391882 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.392007 kubelet[1941]: W0412 18:53:49.391994 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.392088 kubelet[1941]: E0412 18:53:49.392078 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.392358 kubelet[1941]: E0412 18:53:49.392348 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.392435 kubelet[1941]: W0412 18:53:49.392424 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.392508 kubelet[1941]: E0412 18:53:49.392499 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.392713 kubelet[1941]: E0412 18:53:49.392702 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.392786 kubelet[1941]: W0412 18:53:49.392775 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.392875 kubelet[1941]: E0412 18:53:49.392864 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.393132 kubelet[1941]: E0412 18:53:49.393122 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.393230 kubelet[1941]: W0412 18:53:49.393219 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.393297 kubelet[1941]: E0412 18:53:49.393288 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.394310 kubelet[1941]: E0412 18:53:49.394297 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.394391 kubelet[1941]: W0412 18:53:49.394379 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.394479 kubelet[1941]: E0412 18:53:49.394468 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.394560 kubelet[1941]: I0412 18:53:49.394550 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fe9c7123-bb87-4352-a856-546b7767f031-socket-dir\") pod \"csi-node-driver-86hdw\" (UID: \"fe9c7123-bb87-4352-a856-546b7767f031\") " pod="calico-system/csi-node-driver-86hdw" Apr 12 18:53:49.395107 kubelet[1941]: E0412 18:53:49.395096 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.395189 kubelet[1941]: W0412 18:53:49.395177 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.395231 env[1067]: time="2024-04-12T18:53:49.395143676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pf8k4,Uid:ede6d1e3-1288-4bb7-ad13-4f551a990f79,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:49.395509 kubelet[1941]: E0412 18:53:49.395497 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.398049 kubelet[1941]: E0412 18:53:49.398027 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.398880 kubelet[1941]: W0412 18:53:49.398865 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.399025 kubelet[1941]: E0412 18:53:49.399013 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.399218 kubelet[1941]: I0412 18:53:49.399208 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fe9c7123-bb87-4352-a856-546b7767f031-kubelet-dir\") pod \"csi-node-driver-86hdw\" (UID: \"fe9c7123-bb87-4352-a856-546b7767f031\") " pod="calico-system/csi-node-driver-86hdw" Apr 12 18:53:49.399441 kubelet[1941]: E0412 18:53:49.399431 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.399510 kubelet[1941]: W0412 18:53:49.399499 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.399588 kubelet[1941]: E0412 18:53:49.399578 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.399856 kubelet[1941]: E0412 18:53:49.399845 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.399958 kubelet[1941]: W0412 18:53:49.399945 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.400039 kubelet[1941]: E0412 18:53:49.400027 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.400334 kubelet[1941]: E0412 18:53:49.400293 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.400414 kubelet[1941]: W0412 18:53:49.400401 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.400500 kubelet[1941]: E0412 18:53:49.400485 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.400648 kubelet[1941]: I0412 18:53:49.400638 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fe9c7123-bb87-4352-a856-546b7767f031-varrun\") pod \"csi-node-driver-86hdw\" (UID: \"fe9c7123-bb87-4352-a856-546b7767f031\") " pod="calico-system/csi-node-driver-86hdw" Apr 12 18:53:49.400790 kubelet[1941]: E0412 18:53:49.400780 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.400863 kubelet[1941]: W0412 18:53:49.400851 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.400981 kubelet[1941]: E0412 18:53:49.400961 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401150 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402176 kubelet[1941]: W0412 18:53:49.401159 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401180 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401376 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402176 kubelet[1941]: W0412 18:53:49.401385 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401402 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401593 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402176 kubelet[1941]: W0412 18:53:49.401603 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401619 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402176 kubelet[1941]: E0412 18:53:49.401800 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402466 kubelet[1941]: W0412 18:53:49.401810 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402466 kubelet[1941]: E0412 18:53:49.401826 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402466 kubelet[1941]: E0412 18:53:49.401998 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402466 kubelet[1941]: W0412 18:53:49.402008 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402466 kubelet[1941]: E0412 18:53:49.402024 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.402711 kubelet[1941]: E0412 18:53:49.402700 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.402789 kubelet[1941]: W0412 18:53:49.402776 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.402961 kubelet[1941]: E0412 18:53:49.402948 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.403141 kubelet[1941]: E0412 18:53:49.403131 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.403220 kubelet[1941]: W0412 18:53:49.403208 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.403296 kubelet[1941]: E0412 18:53:49.403286 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.403519 kubelet[1941]: E0412 18:53:49.403508 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.403598 kubelet[1941]: W0412 18:53:49.403586 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.403683 kubelet[1941]: E0412 18:53:49.403673 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.404002 kubelet[1941]: E0412 18:53:49.403991 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.404091 kubelet[1941]: W0412 18:53:49.404078 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.404162 kubelet[1941]: E0412 18:53:49.404152 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.404380 kubelet[1941]: E0412 18:53:49.404364 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.404460 kubelet[1941]: W0412 18:53:49.404448 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.404525 kubelet[1941]: E0412 18:53:49.404516 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.420688 env[1067]: time="2024-04-12T18:53:49.420611446Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:49.420823 env[1067]: time="2024-04-12T18:53:49.420690936Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:49.420823 env[1067]: time="2024-04-12T18:53:49.420723146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:49.421117 env[1067]: time="2024-04-12T18:53:49.421063294Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d pid=2356 runtime=io.containerd.runc.v2 Apr 12 18:53:49.436469 systemd[1]: Started cri-containerd-b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d.scope. Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.466000 audit: BPF prog-id=127 op=LOAD Apr 12 18:53:49.466000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.466000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373031346231363338303365663633333835353666353436323464 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373031346231363338303365663633333835353666353436323464 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.467000 audit: BPF prog-id=128 op=LOAD Apr 12 18:53:49.467000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000254d0 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373031346231363338303365663633333835353666353436323464 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.468000 audit: BPF prog-id=129 op=LOAD Apr 12 18:53:49.468000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025518 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373031346231363338303365663633333835353666353436323464 Apr 12 18:53:49.468000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:53:49.468000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.469000 audit: BPF prog-id=130 op=LOAD Apr 12 18:53:49.469000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025928 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373031346231363338303365663633333835353666353436323464 Apr 12 18:53:49.496493 env[1067]: time="2024-04-12T18:53:49.495079274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pf8k4,Uid:ede6d1e3-1288-4bb7-ad13-4f551a990f79,Namespace:calico-system,Attempt:0,} returns sandbox id \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\"" Apr 12 18:53:49.500072 env[1067]: time="2024-04-12T18:53:49.499969571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:53:49.505079 kubelet[1941]: E0412 18:53:49.504871 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.505079 kubelet[1941]: W0412 18:53:49.504889 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.505079 kubelet[1941]: E0412 18:53:49.504932 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.505475 kubelet[1941]: E0412 18:53:49.505327 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.505475 kubelet[1941]: W0412 18:53:49.505339 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.505475 kubelet[1941]: E0412 18:53:49.505353 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.505826 kubelet[1941]: E0412 18:53:49.505676 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.505826 kubelet[1941]: W0412 18:53:49.505688 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.505826 kubelet[1941]: E0412 18:53:49.505701 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.505826 kubelet[1941]: I0412 18:53:49.505737 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7lbc\" (UniqueName: \"kubernetes.io/projected/fe9c7123-bb87-4352-a856-546b7767f031-kube-api-access-f7lbc\") pod \"csi-node-driver-86hdw\" (UID: \"fe9c7123-bb87-4352-a856-546b7767f031\") " pod="calico-system/csi-node-driver-86hdw" Apr 12 18:53:49.506063 kubelet[1941]: E0412 18:53:49.506049 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.506260 kubelet[1941]: W0412 18:53:49.506143 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.506260 kubelet[1941]: E0412 18:53:49.506164 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.506405 kubelet[1941]: E0412 18:53:49.506394 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.506499 kubelet[1941]: W0412 18:53:49.506486 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.506579 kubelet[1941]: E0412 18:53:49.506569 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.506670 kubelet[1941]: I0412 18:53:49.506660 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fe9c7123-bb87-4352-a856-546b7767f031-registration-dir\") pod \"csi-node-driver-86hdw\" (UID: \"fe9c7123-bb87-4352-a856-546b7767f031\") " pod="calico-system/csi-node-driver-86hdw" Apr 12 18:53:49.507048 kubelet[1941]: E0412 18:53:49.507037 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.507132 kubelet[1941]: W0412 18:53:49.507120 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.507213 kubelet[1941]: E0412 18:53:49.507202 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.509747 kubelet[1941]: E0412 18:53:49.509729 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.509864 kubelet[1941]: W0412 18:53:49.509850 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.510003 kubelet[1941]: E0412 18:53:49.509991 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.511106 kubelet[1941]: E0412 18:53:49.511093 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.511212 kubelet[1941]: W0412 18:53:49.511200 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.511293 kubelet[1941]: E0412 18:53:49.511283 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.511575 kubelet[1941]: E0412 18:53:49.511564 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.511650 kubelet[1941]: W0412 18:53:49.511639 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.511757 kubelet[1941]: E0412 18:53:49.511745 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.512414 kubelet[1941]: E0412 18:53:49.512402 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.512529 kubelet[1941]: W0412 18:53:49.512498 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.512879 kubelet[1941]: E0412 18:53:49.512864 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.513055 kubelet[1941]: E0412 18:53:49.513005 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.513143 kubelet[1941]: W0412 18:53:49.513131 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.513353 kubelet[1941]: E0412 18:53:49.513342 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.513507 kubelet[1941]: E0412 18:53:49.513497 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.513623 kubelet[1941]: W0412 18:53:49.513610 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.513829 kubelet[1941]: E0412 18:53:49.513816 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.514018 kubelet[1941]: E0412 18:53:49.514006 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.514125 kubelet[1941]: W0412 18:53:49.514110 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.514315 kubelet[1941]: E0412 18:53:49.514304 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.516049 kubelet[1941]: E0412 18:53:49.516036 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.516137 kubelet[1941]: W0412 18:53:49.516114 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.516252 kubelet[1941]: E0412 18:53:49.516242 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.516685 kubelet[1941]: E0412 18:53:49.516674 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.516776 kubelet[1941]: W0412 18:53:49.516764 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.516897 kubelet[1941]: E0412 18:53:49.516887 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.517099 kubelet[1941]: E0412 18:53:49.517089 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.517163 kubelet[1941]: W0412 18:53:49.517153 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.517229 kubelet[1941]: E0412 18:53:49.517220 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.517435 kubelet[1941]: E0412 18:53:49.517425 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.517514 kubelet[1941]: W0412 18:53:49.517503 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.517631 kubelet[1941]: E0412 18:53:49.517621 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.518047 kubelet[1941]: E0412 18:53:49.518036 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.518157 kubelet[1941]: W0412 18:53:49.518144 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.518236 kubelet[1941]: E0412 18:53:49.518223 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.518513 kubelet[1941]: E0412 18:53:49.518502 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.518590 kubelet[1941]: W0412 18:53:49.518578 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.518670 kubelet[1941]: E0412 18:53:49.518661 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.518954 kubelet[1941]: E0412 18:53:49.518942 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.519023 kubelet[1941]: W0412 18:53:49.519012 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.519115 kubelet[1941]: E0412 18:53:49.519105 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.523327 kubelet[1941]: E0412 18:53:49.523302 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.523327 kubelet[1941]: W0412 18:53:49.523319 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.523480 kubelet[1941]: E0412 18:53:49.523339 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.559000 audit[2412]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:49.559000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdba768fb0 a2=0 a3=7ffdba768f9c items=0 ppid=2079 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:49.560000 audit[2412]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:49.560000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdba768fb0 a2=0 a3=0 items=0 ppid=2079 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:49.598165 env[1067]: time="2024-04-12T18:53:49.598120239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68dc8f7f54-5j7f5,Uid:ffabe3d4-da49-4272-b81f-362c2234a074,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:49.607274 kubelet[1941]: E0412 18:53:49.607253 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.607424 kubelet[1941]: W0412 18:53:49.607409 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.607498 kubelet[1941]: E0412 18:53:49.607487 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.609318 kubelet[1941]: E0412 18:53:49.609293 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.609465 kubelet[1941]: W0412 18:53:49.609449 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.609553 kubelet[1941]: E0412 18:53:49.609541 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.610038 kubelet[1941]: E0412 18:53:49.609997 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.610135 kubelet[1941]: W0412 18:53:49.610120 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.610225 kubelet[1941]: E0412 18:53:49.610211 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.610563 kubelet[1941]: E0412 18:53:49.610536 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.610648 kubelet[1941]: W0412 18:53:49.610561 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.610648 kubelet[1941]: E0412 18:53:49.610593 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.610886 kubelet[1941]: E0412 18:53:49.610868 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.610886 kubelet[1941]: W0412 18:53:49.610882 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.611022 kubelet[1941]: E0412 18:53:49.610904 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.611234 kubelet[1941]: E0412 18:53:49.611214 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.611319 kubelet[1941]: W0412 18:53:49.611234 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.611319 kubelet[1941]: E0412 18:53:49.611256 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.611575 kubelet[1941]: E0412 18:53:49.611556 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.611575 kubelet[1941]: W0412 18:53:49.611570 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.611728 kubelet[1941]: E0412 18:53:49.611713 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.612190 kubelet[1941]: E0412 18:53:49.612170 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.612190 kubelet[1941]: W0412 18:53:49.612185 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.612190 kubelet[1941]: E0412 18:53:49.612200 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.612684 kubelet[1941]: E0412 18:53:49.612458 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.612684 kubelet[1941]: W0412 18:53:49.612473 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.612684 kubelet[1941]: E0412 18:53:49.612487 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.613142 kubelet[1941]: E0412 18:53:49.612941 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.613142 kubelet[1941]: W0412 18:53:49.613085 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.613142 kubelet[1941]: E0412 18:53:49.613107 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.622983 env[1067]: time="2024-04-12T18:53:49.621785626Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:49.622983 env[1067]: time="2024-04-12T18:53:49.621844397Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:49.622983 env[1067]: time="2024-04-12T18:53:49.621860016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:49.622983 env[1067]: time="2024-04-12T18:53:49.622011000Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ac7e8022915bba8e422bffd6f6f741762603864d63e6687290f35b402e33672 pid=2430 runtime=io.containerd.runc.v2 Apr 12 18:53:49.631186 kubelet[1941]: E0412 18:53:49.631155 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:49.631336 kubelet[1941]: W0412 18:53:49.631321 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:49.631417 kubelet[1941]: E0412 18:53:49.631405 1941 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:49.637768 systemd[1]: Started cri-containerd-8ac7e8022915bba8e422bffd6f6f741762603864d63e6687290f35b402e33672.scope. Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.667000 audit: BPF prog-id=131 op=LOAD Apr 12 18:53:49.668000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.668000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2430 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861633765383032323931356262613865343232626666643666366637 Apr 12 18:53:49.668000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.668000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2430 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861633765383032323931356262613865343232626666643666366637 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit: BPF prog-id=132 op=LOAD Apr 12 18:53:49.669000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000327060 items=0 ppid=2430 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861633765383032323931356262613865343232626666643666366637 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.669000 audit: BPF prog-id=133 op=LOAD Apr 12 18:53:49.669000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003270a8 items=0 ppid=2430 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861633765383032323931356262613865343232626666643666366637 Apr 12 18:53:49.670000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:53:49.670000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:49.670000 audit: BPF prog-id=134 op=LOAD Apr 12 18:53:49.670000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003274b8 items=0 ppid=2430 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:49.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861633765383032323931356262613865343232626666643666366637 Apr 12 18:53:49.712270 env[1067]: time="2024-04-12T18:53:49.712123956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68dc8f7f54-5j7f5,Uid:ffabe3d4-da49-4272-b81f-362c2234a074,Namespace:calico-system,Attempt:0,} returns sandbox id \"8ac7e8022915bba8e422bffd6f6f741762603864d63e6687290f35b402e33672\"" Apr 12 18:53:51.069888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2381152733.mount: Deactivated successfully. Apr 12 18:53:51.139947 kubelet[1941]: E0412 18:53:51.139037 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:52.665263 env[1067]: time="2024-04-12T18:53:52.665218832Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.668883 env[1067]: time="2024-04-12T18:53:52.668849094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.672744 env[1067]: time="2024-04-12T18:53:52.672712212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.676149 env[1067]: time="2024-04-12T18:53:52.676085822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.677246 env[1067]: time="2024-04-12T18:53:52.677213559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:53:52.678310 env[1067]: time="2024-04-12T18:53:52.677888225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:53:52.680622 env[1067]: time="2024-04-12T18:53:52.680588120Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:53:52.709351 env[1067]: time="2024-04-12T18:53:52.709302658Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45\"" Apr 12 18:53:52.710234 env[1067]: time="2024-04-12T18:53:52.710208908Z" level=info msg="StartContainer for \"ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45\"" Apr 12 18:53:52.737157 systemd[1]: Started cri-containerd-ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45.scope. Apr 12 18:53:52.767508 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:53:52.767708 kernel: audit: type=1400 audit(1712948032.760:994): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.773270 kernel: audit: type=1300 audit(1712948032.760:994): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f795da78718 items=0 ppid=2356 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:52.760000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f795da78718 items=0 ppid=2356 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:52.779209 kernel: audit: type=1327 audit(1712948032.760:994): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313736393863343632386466373863333333346136346665303038 Apr 12 18:53:52.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313736393863343632386466373863333333346136346665303038 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.784042 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.787938 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.798475 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.798585 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.809149 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.809202 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.812804 kernel: audit: type=1400 audit(1712948032.760:995): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit: BPF prog-id=135 op=LOAD Apr 12 18:53:52.760000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000210a48 items=0 ppid=2356 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:52.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313736393863343632386466373863333333346136346665303038 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.760000 audit: BPF prog-id=136 op=LOAD Apr 12 18:53:52.760000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000210a98 items=0 ppid=2356 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:52.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313736393863343632386466373863333333346136346665303038 Apr 12 18:53:52.761000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:53:52.761000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:52.761000 audit: BPF prog-id=137 op=LOAD Apr 12 18:53:52.761000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000210b28 items=0 ppid=2356 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:52.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313736393863343632386466373863333333346136346665303038 Apr 12 18:53:52.821646 env[1067]: time="2024-04-12T18:53:52.821598490Z" level=info msg="StartContainer for \"ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45\" returns successfully" Apr 12 18:53:52.841827 systemd[1]: cri-containerd-ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45.scope: Deactivated successfully. Apr 12 18:53:52.846000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:53:52.868749 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45-rootfs.mount: Deactivated successfully. Apr 12 18:53:53.137942 kubelet[1941]: E0412 18:53:53.137872 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:53.486439 env[1067]: time="2024-04-12T18:53:53.486235342Z" level=info msg="shim disconnected" id=ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45 Apr 12 18:53:53.486439 env[1067]: time="2024-04-12T18:53:53.486335540Z" level=warning msg="cleaning up after shim disconnected" id=ba17698c4628df78c3334a64fe0085ca53b637ded41fd72e685efb7ab4f34f45 namespace=k8s.io Apr 12 18:53:53.486439 env[1067]: time="2024-04-12T18:53:53.486361158Z" level=info msg="cleaning up dead shim" Apr 12 18:53:53.504708 env[1067]: time="2024-04-12T18:53:53.504631138Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:53:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2518 runtime=io.containerd.runc.v2\n" Apr 12 18:53:54.548972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4163686676.mount: Deactivated successfully. Apr 12 18:53:55.142908 kubelet[1941]: E0412 18:53:55.140510 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:57.137851 kubelet[1941]: E0412 18:53:57.137804 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:57.713528 env[1067]: time="2024-04-12T18:53:57.713457232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.716632 env[1067]: time="2024-04-12T18:53:57.716597233Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.720271 env[1067]: time="2024-04-12T18:53:57.720242912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.724615 env[1067]: time="2024-04-12T18:53:57.724575431Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.726231 env[1067]: time="2024-04-12T18:53:57.726178178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:53:57.727680 env[1067]: time="2024-04-12T18:53:57.727621035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:53:57.743576 env[1067]: time="2024-04-12T18:53:57.743506838Z" level=info msg="CreateContainer within sandbox \"8ac7e8022915bba8e422bffd6f6f741762603864d63e6687290f35b402e33672\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:53:57.778675 env[1067]: time="2024-04-12T18:53:57.778579137Z" level=info msg="CreateContainer within sandbox \"8ac7e8022915bba8e422bffd6f6f741762603864d63e6687290f35b402e33672\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3e98b56dd9b28f35dbfe9f36d3b3963460110c675a49f588a6b0708de72f84f4\"" Apr 12 18:53:57.779468 env[1067]: time="2024-04-12T18:53:57.779428971Z" level=info msg="StartContainer for \"3e98b56dd9b28f35dbfe9f36d3b3963460110c675a49f588a6b0708de72f84f4\"" Apr 12 18:53:57.815036 systemd[1]: Started cri-containerd-3e98b56dd9b28f35dbfe9f36d3b3963460110c675a49f588a6b0708de72f84f4.scope. Apr 12 18:53:57.849512 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:53:57.849685 kernel: audit: type=1400 audit(1712948037.839:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.849734 kernel: audit: type=1400 audit(1712948037.839:1002): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.858082 kernel: audit: type=1400 audit(1712948037.839:1003): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.862040 kernel: audit: type=1400 audit(1712948037.839:1004): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.867208 kernel: audit: type=1400 audit(1712948037.839:1005): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.875727 kernel: audit: type=1400 audit(1712948037.839:1006): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.875815 kernel: audit: type=1400 audit(1712948037.839:1007): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.884830 kernel: audit: type=1400 audit(1712948037.839:1008): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.885011 kernel: audit: type=1400 audit(1712948037.839:1009): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.840000 audit: BPF prog-id=138 op=LOAD Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.888941 kernel: audit: type=1400 audit(1712948037.840:1010): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2430 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365393862353664643962323866333564626665396633366433623339 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2430 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365393862353664643962323866333564626665396633366433623339 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.851000 audit: BPF prog-id=139 op=LOAD Apr 12 18:53:57.851000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002e7dc0 items=0 ppid=2430 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365393862353664643962323866333564626665396633366433623339 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit: BPF prog-id=140 op=LOAD Apr 12 18:53:57.852000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002e7e08 items=0 ppid=2430 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365393862353664643962323866333564626665396633366433623339 Apr 12 18:53:57.852000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:53:57.852000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.852000 audit: BPF prog-id=141 op=LOAD Apr 12 18:53:57.852000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000354218 items=0 ppid=2430 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365393862353664643962323866333564626665396633366433623339 Apr 12 18:53:58.004862 env[1067]: time="2024-04-12T18:53:58.004643653Z" level=info msg="StartContainer for \"3e98b56dd9b28f35dbfe9f36d3b3963460110c675a49f588a6b0708de72f84f4\" returns successfully" Apr 12 18:53:58.291750 kubelet[1941]: I0412 18:53:58.291584 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-68dc8f7f54-5j7f5" podStartSLOduration=2.281086621 podStartE2EDuration="10.29150495s" podCreationTimestamp="2024-04-12 18:53:48 +0000 UTC" firstStartedPulling="2024-04-12 18:53:49.716312636 +0000 UTC m=+20.733208478" lastFinishedPulling="2024-04-12 18:53:57.726730955 +0000 UTC m=+28.743626807" observedRunningTime="2024-04-12 18:53:58.289509637 +0000 UTC m=+29.306405479" watchObservedRunningTime="2024-04-12 18:53:58.29150495 +0000 UTC m=+29.308400803" Apr 12 18:53:59.138883 kubelet[1941]: E0412 18:53:59.138837 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:53:59.272389 kubelet[1941]: I0412 18:53:59.272343 1941 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:53:59.896476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4265753713.mount: Deactivated successfully. Apr 12 18:54:01.138390 kubelet[1941]: E0412 18:54:01.138301 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:03.138440 kubelet[1941]: E0412 18:54:03.138129 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:05.140594 kubelet[1941]: E0412 18:54:05.140534 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:06.216954 env[1067]: time="2024-04-12T18:54:06.216815231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:06.222172 env[1067]: time="2024-04-12T18:54:06.222073656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:06.226140 env[1067]: time="2024-04-12T18:54:06.226112401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:06.231101 env[1067]: time="2024-04-12T18:54:06.231073488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:06.234749 env[1067]: time="2024-04-12T18:54:06.234664874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:54:06.238587 env[1067]: time="2024-04-12T18:54:06.238550312Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:54:06.263450 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3121384674.mount: Deactivated successfully. Apr 12 18:54:06.272481 env[1067]: time="2024-04-12T18:54:06.272387635Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc\"" Apr 12 18:54:06.275335 env[1067]: time="2024-04-12T18:54:06.274085390Z" level=info msg="StartContainer for \"60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc\"" Apr 12 18:54:06.316542 systemd[1]: Started cri-containerd-60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc.scope. Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.342051 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 18:54:06.342114 kernel: audit: type=1400 audit(1712948046.340:1019): avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f229c42a578 items=0 ppid=2356 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.350972 kernel: audit: type=1300 audit(1712948046.340:1019): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f229c42a578 items=0 ppid=2356 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.351022 kernel: audit: type=1327 audit(1712948046.340:1019): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626534316532313935353636356565396461393365646334633565 Apr 12 18:54:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626534316532313935353636356565396461393365646334633565 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.359093 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.359137 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.365878 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.374314 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.374391 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.377975 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.378013 kernel: audit: type=1400 audit(1712948046.340:1020): avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.340000 audit: BPF prog-id=142 op=LOAD Apr 12 18:54:06.340000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032a938 items=0 ppid=2356 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626534316532313935353636356565396461393365646334633565 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.350000 audit: BPF prog-id=143 op=LOAD Apr 12 18:54:06.350000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032a988 items=0 ppid=2356 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626534316532313935353636356565396461393365646334633565 Apr 12 18:54:06.355000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:54:06.355000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:06.355000 audit: BPF prog-id=144 op=LOAD Apr 12 18:54:06.355000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032aa18 items=0 ppid=2356 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626534316532313935353636356565396461393365646334633565 Apr 12 18:54:06.403131 env[1067]: time="2024-04-12T18:54:06.403062530Z" level=info msg="StartContainer for \"60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc\" returns successfully" Apr 12 18:54:07.141492 kubelet[1941]: E0412 18:54:07.141434 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:08.241740 env[1067]: time="2024-04-12T18:54:08.241675062Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:54:08.245082 systemd[1]: cri-containerd-60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc.scope: Deactivated successfully. Apr 12 18:54:08.247000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:54:08.270256 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc-rootfs.mount: Deactivated successfully. Apr 12 18:54:08.284239 env[1067]: time="2024-04-12T18:54:08.284192557Z" level=info msg="shim disconnected" id=60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc Apr 12 18:54:08.284465 env[1067]: time="2024-04-12T18:54:08.284247850Z" level=warning msg="cleaning up after shim disconnected" id=60be41e21955665ee9da93edc4c5e914ecdc1fd9b744b76c97b1ae230f0b54bc namespace=k8s.io Apr 12 18:54:08.284465 env[1067]: time="2024-04-12T18:54:08.284259472Z" level=info msg="cleaning up dead shim" Apr 12 18:54:08.290148 kubelet[1941]: I0412 18:54:08.289292 1941 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:54:08.300305 env[1067]: time="2024-04-12T18:54:08.300244146Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:54:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2617 runtime=io.containerd.runc.v2\n" Apr 12 18:54:08.309746 env[1067]: time="2024-04-12T18:54:08.309713639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:54:08.332471 kubelet[1941]: I0412 18:54:08.331745 1941 topology_manager.go:215] "Topology Admit Handler" podUID="84611d9b-7ea4-4bac-81d8-363ca715fd18" podNamespace="kube-system" podName="coredns-76f75df574-5txfx" Apr 12 18:54:08.338121 systemd[1]: Created slice kubepods-burstable-pod84611d9b_7ea4_4bac_81d8_363ca715fd18.slice. Apr 12 18:54:08.341406 kubelet[1941]: I0412 18:54:08.341379 1941 topology_manager.go:215] "Topology Admit Handler" podUID="3891506f-6a62-4f94-87d3-0df292e6c43d" podNamespace="kube-system" podName="coredns-76f75df574-d8lfr" Apr 12 18:54:08.349596 systemd[1]: Created slice kubepods-burstable-pod3891506f_6a62_4f94_87d3_0df292e6c43d.slice. Apr 12 18:54:08.357498 kubelet[1941]: I0412 18:54:08.357470 1941 topology_manager.go:215] "Topology Admit Handler" podUID="62149448-ed26-4de1-be82-84dac9c213c3" podNamespace="calico-system" podName="calico-kube-controllers-5f87cdc8dd-cfwpd" Apr 12 18:54:08.370608 systemd[1]: Created slice kubepods-besteffort-pod62149448_ed26_4de1_be82_84dac9c213c3.slice. Apr 12 18:54:08.456979 kubelet[1941]: I0412 18:54:08.456774 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/84611d9b-7ea4-4bac-81d8-363ca715fd18-config-volume\") pod \"coredns-76f75df574-5txfx\" (UID: \"84611d9b-7ea4-4bac-81d8-363ca715fd18\") " pod="kube-system/coredns-76f75df574-5txfx" Apr 12 18:54:08.458122 kubelet[1941]: I0412 18:54:08.458034 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqw68\" (UniqueName: \"kubernetes.io/projected/84611d9b-7ea4-4bac-81d8-363ca715fd18-kube-api-access-dqw68\") pod \"coredns-76f75df574-5txfx\" (UID: \"84611d9b-7ea4-4bac-81d8-363ca715fd18\") " pod="kube-system/coredns-76f75df574-5txfx" Apr 12 18:54:08.458257 kubelet[1941]: I0412 18:54:08.458229 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4gt98\" (UniqueName: \"kubernetes.io/projected/3891506f-6a62-4f94-87d3-0df292e6c43d-kube-api-access-4gt98\") pod \"coredns-76f75df574-d8lfr\" (UID: \"3891506f-6a62-4f94-87d3-0df292e6c43d\") " pod="kube-system/coredns-76f75df574-d8lfr" Apr 12 18:54:08.458473 kubelet[1941]: I0412 18:54:08.458403 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3891506f-6a62-4f94-87d3-0df292e6c43d-config-volume\") pod \"coredns-76f75df574-d8lfr\" (UID: \"3891506f-6a62-4f94-87d3-0df292e6c43d\") " pod="kube-system/coredns-76f75df574-d8lfr" Apr 12 18:54:08.558971 kubelet[1941]: I0412 18:54:08.558885 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wn2cm\" (UniqueName: \"kubernetes.io/projected/62149448-ed26-4de1-be82-84dac9c213c3-kube-api-access-wn2cm\") pod \"calico-kube-controllers-5f87cdc8dd-cfwpd\" (UID: \"62149448-ed26-4de1-be82-84dac9c213c3\") " pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" Apr 12 18:54:08.559381 kubelet[1941]: I0412 18:54:08.559354 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/62149448-ed26-4de1-be82-84dac9c213c3-tigera-ca-bundle\") pod \"calico-kube-controllers-5f87cdc8dd-cfwpd\" (UID: \"62149448-ed26-4de1-be82-84dac9c213c3\") " pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" Apr 12 18:54:08.643758 env[1067]: time="2024-04-12T18:54:08.643075836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5txfx,Uid:84611d9b-7ea4-4bac-81d8-363ca715fd18,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:08.664154 env[1067]: time="2024-04-12T18:54:08.663845676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-d8lfr,Uid:3891506f-6a62-4f94-87d3-0df292e6c43d,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:09.031199 env[1067]: time="2024-04-12T18:54:09.030412326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f87cdc8dd-cfwpd,Uid:62149448-ed26-4de1-be82-84dac9c213c3,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:09.151824 systemd[1]: Created slice kubepods-besteffort-podfe9c7123_bb87_4352_a856_546b7767f031.slice. Apr 12 18:54:09.157827 env[1067]: time="2024-04-12T18:54:09.157365933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-86hdw,Uid:fe9c7123-bb87-4352-a856-546b7767f031,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:09.422277 env[1067]: time="2024-04-12T18:54:09.422210400Z" level=error msg="Failed to destroy network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.426324 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332-shm.mount: Deactivated successfully. Apr 12 18:54:09.427475 env[1067]: time="2024-04-12T18:54:09.427434920Z" level=error msg="encountered an error cleaning up failed sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.428057 env[1067]: time="2024-04-12T18:54:09.428010920Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f87cdc8dd-cfwpd,Uid:62149448-ed26-4de1-be82-84dac9c213c3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.428483 kubelet[1941]: E0412 18:54:09.428453 1941 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.428719 kubelet[1941]: E0412 18:54:09.428524 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" Apr 12 18:54:09.428719 kubelet[1941]: E0412 18:54:09.428553 1941 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" Apr 12 18:54:09.428719 kubelet[1941]: E0412 18:54:09.428614 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5f87cdc8dd-cfwpd_calico-system(62149448-ed26-4de1-be82-84dac9c213c3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5f87cdc8dd-cfwpd_calico-system(62149448-ed26-4de1-be82-84dac9c213c3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" podUID="62149448-ed26-4de1-be82-84dac9c213c3" Apr 12 18:54:09.433354 env[1067]: time="2024-04-12T18:54:09.433300583Z" level=error msg="Failed to destroy network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.436105 env[1067]: time="2024-04-12T18:54:09.433710812Z" level=error msg="encountered an error cleaning up failed sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.436105 env[1067]: time="2024-04-12T18:54:09.433770214Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-86hdw,Uid:fe9c7123-bb87-4352-a856-546b7767f031,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.436227 kubelet[1941]: E0412 18:54:09.433978 1941 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.436227 kubelet[1941]: E0412 18:54:09.434026 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-86hdw" Apr 12 18:54:09.436227 kubelet[1941]: E0412 18:54:09.434066 1941 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-86hdw" Apr 12 18:54:09.436366 kubelet[1941]: E0412 18:54:09.434131 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-86hdw_calico-system(fe9c7123-bb87-4352-a856-546b7767f031)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-86hdw_calico-system(fe9c7123-bb87-4352-a856-546b7767f031)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:09.437217 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75-shm.mount: Deactivated successfully. Apr 12 18:54:09.449518 env[1067]: time="2024-04-12T18:54:09.449443834Z" level=error msg="Failed to destroy network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.454058 env[1067]: time="2024-04-12T18:54:09.451829749Z" level=error msg="encountered an error cleaning up failed sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.454058 env[1067]: time="2024-04-12T18:54:09.451884151Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5txfx,Uid:84611d9b-7ea4-4bac-81d8-363ca715fd18,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.454166 kubelet[1941]: E0412 18:54:09.452151 1941 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.454166 kubelet[1941]: E0412 18:54:09.452226 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5txfx" Apr 12 18:54:09.454166 kubelet[1941]: E0412 18:54:09.452253 1941 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5txfx" Apr 12 18:54:09.451878 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc-shm.mount: Deactivated successfully. Apr 12 18:54:09.454341 kubelet[1941]: E0412 18:54:09.452328 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-5txfx_kube-system(84611d9b-7ea4-4bac-81d8-363ca715fd18)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-5txfx_kube-system(84611d9b-7ea4-4bac-81d8-363ca715fd18)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5txfx" podUID="84611d9b-7ea4-4bac-81d8-363ca715fd18" Apr 12 18:54:09.456045 env[1067]: time="2024-04-12T18:54:09.455988861Z" level=error msg="Failed to destroy network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.458004 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b-shm.mount: Deactivated successfully. Apr 12 18:54:09.459104 env[1067]: time="2024-04-12T18:54:09.459065933Z" level=error msg="encountered an error cleaning up failed sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.459235 env[1067]: time="2024-04-12T18:54:09.459203902Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-d8lfr,Uid:3891506f-6a62-4f94-87d3-0df292e6c43d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.459530 kubelet[1941]: E0412 18:54:09.459511 1941 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:09.459611 kubelet[1941]: E0412 18:54:09.459576 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-d8lfr" Apr 12 18:54:09.459649 kubelet[1941]: E0412 18:54:09.459603 1941 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-d8lfr" Apr 12 18:54:09.459716 kubelet[1941]: E0412 18:54:09.459702 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-d8lfr_kube-system(3891506f-6a62-4f94-87d3-0df292e6c43d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-d8lfr_kube-system(3891506f-6a62-4f94-87d3-0df292e6c43d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-d8lfr" podUID="3891506f-6a62-4f94-87d3-0df292e6c43d" Apr 12 18:54:10.314987 kubelet[1941]: I0412 18:54:10.314889 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:10.319866 env[1067]: time="2024-04-12T18:54:10.319793335Z" level=info msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" Apr 12 18:54:10.335974 kubelet[1941]: I0412 18:54:10.335538 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:10.340977 kubelet[1941]: I0412 18:54:10.340893 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:10.342117 env[1067]: time="2024-04-12T18:54:10.342041177Z" level=info msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" Apr 12 18:54:10.361275 env[1067]: time="2024-04-12T18:54:10.361207629Z" level=info msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" Apr 12 18:54:10.363649 kubelet[1941]: I0412 18:54:10.363523 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:10.378039 env[1067]: time="2024-04-12T18:54:10.377971714Z" level=info msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" Apr 12 18:54:10.468011 env[1067]: time="2024-04-12T18:54:10.467951183Z" level=error msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" failed" error="failed to destroy network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:10.468616 kubelet[1941]: E0412 18:54:10.468588 1941 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:10.468873 kubelet[1941]: E0412 18:54:10.468678 1941 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b"} Apr 12 18:54:10.468873 kubelet[1941]: E0412 18:54:10.468745 1941 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3891506f-6a62-4f94-87d3-0df292e6c43d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:10.468873 kubelet[1941]: E0412 18:54:10.468782 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3891506f-6a62-4f94-87d3-0df292e6c43d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-d8lfr" podUID="3891506f-6a62-4f94-87d3-0df292e6c43d" Apr 12 18:54:10.481308 env[1067]: time="2024-04-12T18:54:10.481255328Z" level=error msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" failed" error="failed to destroy network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:10.481737 kubelet[1941]: E0412 18:54:10.481711 1941 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:10.481810 kubelet[1941]: E0412 18:54:10.481764 1941 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332"} Apr 12 18:54:10.481858 kubelet[1941]: E0412 18:54:10.481814 1941 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"62149448-ed26-4de1-be82-84dac9c213c3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:10.481858 kubelet[1941]: E0412 18:54:10.481852 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"62149448-ed26-4de1-be82-84dac9c213c3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" podUID="62149448-ed26-4de1-be82-84dac9c213c3" Apr 12 18:54:10.483028 env[1067]: time="2024-04-12T18:54:10.482992978Z" level=error msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" failed" error="failed to destroy network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:10.483468 kubelet[1941]: E0412 18:54:10.483284 1941 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:10.483468 kubelet[1941]: E0412 18:54:10.483344 1941 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc"} Apr 12 18:54:10.483468 kubelet[1941]: E0412 18:54:10.483392 1941 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84611d9b-7ea4-4bac-81d8-363ca715fd18\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:10.483468 kubelet[1941]: E0412 18:54:10.483448 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84611d9b-7ea4-4bac-81d8-363ca715fd18\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5txfx" podUID="84611d9b-7ea4-4bac-81d8-363ca715fd18" Apr 12 18:54:10.484122 env[1067]: time="2024-04-12T18:54:10.484086319Z" level=error msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" failed" error="failed to destroy network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:10.484361 kubelet[1941]: E0412 18:54:10.484325 1941 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:10.484361 kubelet[1941]: E0412 18:54:10.484358 1941 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75"} Apr 12 18:54:10.484531 kubelet[1941]: E0412 18:54:10.484396 1941 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe9c7123-bb87-4352-a856-546b7767f031\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:10.484531 kubelet[1941]: E0412 18:54:10.484426 1941 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe9c7123-bb87-4352-a856-546b7767f031\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-86hdw" podUID="fe9c7123-bb87-4352-a856-546b7767f031" Apr 12 18:54:12.777243 kubelet[1941]: I0412 18:54:12.777081 1941 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:13.233975 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:54:13.234151 kernel: audit: type=1325 audit(1712948053.222:1026): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.234189 kernel: audit: type=1300 audit(1712948053.222:1026): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffde4b02e60 a2=0 a3=7ffde4b02e4c items=0 ppid=2079 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.222000 audit[2841]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.222000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffde4b02e60 a2=0 a3=7ffde4b02e4c items=0 ppid=2079 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.239781 kernel: audit: type=1327 audit(1712948053.222:1026): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.239835 kernel: audit: type=1325 audit(1712948053.223:1027): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.223000 audit[2841]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.223000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffde4b02e60 a2=0 a3=7ffde4b02e4c items=0 ppid=2079 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.248488 kernel: audit: type=1300 audit(1712948053.223:1027): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffde4b02e60 a2=0 a3=7ffde4b02e4c items=0 ppid=2079 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.248543 kernel: audit: type=1327 audit(1712948053.223:1027): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:18.615495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount662086878.mount: Deactivated successfully. Apr 12 18:54:18.817631 env[1067]: time="2024-04-12T18:54:18.817511451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:18.825258 env[1067]: time="2024-04-12T18:54:18.825171104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:18.829607 env[1067]: time="2024-04-12T18:54:18.829537452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:18.835213 env[1067]: time="2024-04-12T18:54:18.835101083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:18.837360 env[1067]: time="2024-04-12T18:54:18.837242480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:54:18.886318 env[1067]: time="2024-04-12T18:54:18.885814201Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:54:18.916981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount622239143.mount: Deactivated successfully. Apr 12 18:54:18.939672 env[1067]: time="2024-04-12T18:54:18.939625431Z" level=info msg="CreateContainer within sandbox \"b37014b163803ef6338556f54624df22f26039b7792b0d08f6e978606ffb040d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c\"" Apr 12 18:54:18.941757 env[1067]: time="2024-04-12T18:54:18.941729829Z" level=info msg="StartContainer for \"807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c\"" Apr 12 18:54:18.972650 systemd[1]: Started cri-containerd-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c.scope. Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9444fdc8d8 items=0 ppid=2356 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.013015 kernel: audit: type=1400 audit(1712948059.001:1028): avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.013233 kernel: audit: type=1300 audit(1712948059.001:1028): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9444fdc8d8 items=0 ppid=2356 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.013335 kernel: audit: type=1327 audit(1712948059.001:1028): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376532663861303334306663653461303565646432373130366463 Apr 12 18:54:19.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376532663861303334306663653461303565646432373130366463 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.021693 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.021869 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.029076 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.029189 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.036995 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.040937 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.045990 kernel: audit: type=1400 audit(1712948059.001:1029): avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.001000 audit: BPF prog-id=145 op=LOAD Apr 12 18:54:19.001000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039a768 items=0 ppid=2356 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376532663861303334306663653461303565646432373130366463 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.016000 audit: BPF prog-id=146 op=LOAD Apr 12 18:54:19.016000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039a7b8 items=0 ppid=2356 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376532663861303334306663653461303565646432373130366463 Apr 12 18:54:19.024000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:54:19.024000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:19.024000 audit: BPF prog-id=147 op=LOAD Apr 12 18:54:19.024000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039a848 items=0 ppid=2356 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376532663861303334306663653461303565646432373130366463 Apr 12 18:54:19.065144 env[1067]: time="2024-04-12T18:54:19.065088653Z" level=info msg="StartContainer for \"807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c\" returns successfully" Apr 12 18:54:19.174729 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:54:19.176519 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:54:19.415496 kubelet[1941]: I0412 18:54:19.414834 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pf8k4" podStartSLOduration=2.071675839 podStartE2EDuration="31.409832243s" podCreationTimestamp="2024-04-12 18:53:48 +0000 UTC" firstStartedPulling="2024-04-12 18:53:49.4997136 +0000 UTC m=+20.516609443" lastFinishedPulling="2024-04-12 18:54:18.837869954 +0000 UTC m=+49.854765847" observedRunningTime="2024-04-12 18:54:19.409557974 +0000 UTC m=+50.426453846" watchObservedRunningTime="2024-04-12 18:54:19.409832243 +0000 UTC m=+50.426728095" Apr 12 18:54:20.410572 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.k134sm.mount: Deactivated successfully. Apr 12 18:54:20.725000 audit[2988]: AVC avc: denied { write } for pid=2988 comm="tee" name="fd" dev="proc" ino=26070 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.725000 audit[2988]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdbe77951 a2=241 a3=1b6 items=1 ppid=2958 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.725000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:54:20.725000 audit: PATH item=0 name="/dev/fd/63" inode=26056 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.741000 audit[2992]: AVC avc: denied { write } for pid=2992 comm="tee" name="fd" dev="proc" ino=26082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.741000 audit[2992]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff352d3961 a2=241 a3=1b6 items=1 ppid=2967 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.741000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:54:20.741000 audit: PATH item=0 name="/dev/fd/63" inode=26067 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.741000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.751000 audit[3008]: AVC avc: denied { write } for pid=3008 comm="tee" name="fd" dev="proc" ino=26089 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.751000 audit[3008]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd22600952 a2=241 a3=1b6 items=1 ppid=2963 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.753000 audit[3015]: AVC avc: denied { write } for pid=3015 comm="tee" name="fd" dev="proc" ino=26093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.753000 audit[3015]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7e205963 a2=241 a3=1b6 items=1 ppid=2965 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.753000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:54:20.753000 audit: PATH item=0 name="/dev/fd/63" inode=25425 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.751000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:54:20.751000 audit: PATH item=0 name="/dev/fd/63" inode=25423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.753000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.766000 audit[3019]: AVC avc: denied { write } for pid=3019 comm="tee" name="fd" dev="proc" ino=26100 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.766000 audit[3019]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff643de962 a2=241 a3=1b6 items=1 ppid=2982 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.766000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:54:20.766000 audit: PATH item=0 name="/dev/fd/63" inode=26086 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.774000 audit[3004]: AVC avc: denied { write } for pid=3004 comm="tee" name="fd" dev="proc" ino=26104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.774000 audit[3004]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdbe96961 a2=241 a3=1b6 items=1 ppid=2960 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.774000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:54:20.774000 audit: PATH item=0 name="/dev/fd/63" inode=25420 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.776000 audit[3010]: AVC avc: denied { write } for pid=3010 comm="tee" name="fd" dev="proc" ino=26108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:20.776000 audit[3010]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4c079961 a2=241 a3=1b6 items=1 ppid=2962 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:20.776000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:54:20.776000 audit: PATH item=0 name="/dev/fd/63" inode=25424 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:20.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:20.774000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:21.424823 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.K5GTWo.mount: Deactivated successfully. Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.635000 audit: BPF prog-id=148 op=LOAD Apr 12 18:54:21.635000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfb753600 a2=70 a3=7fa658c02000 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.640000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.640000 audit: BPF prog-id=149 op=LOAD Apr 12 18:54:21.640000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfb753600 a2=70 a3=6f items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.646000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfb7535b0 a2=70 a3=470860 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.646000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.646000 audit: BPF prog-id=150 op=LOAD Apr 12 18:54:21.646000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdfb753590 a2=70 a3=7ffdfb753600 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.646000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.646000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:54:21.647000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.647000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb753670 a2=70 a3=0 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.648000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.648000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb753660 a2=70 a3=0 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.648000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.648000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb7535d0 a2=70 a3=0 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.651000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.651000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdfb7536a0 a2=70 a3=fe00 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfb7536a0 a2=70 a3=fe00 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.653000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.653000 audit: BPF prog-id=151 op=LOAD Apr 12 18:54:21.653000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfb7535c0 a2=70 a3=0 items=0 ppid=2969 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.653000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:21.659000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.659000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe9969aa50 a2=70 a3=ffff items=0 ppid=2969 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.659000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:21.660000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:21.660000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe9969a920 a2=70 a3=3 items=0 ppid=2969 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.660000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:21.675000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:54:21.799000 audit[3147]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.801000 audit[3146]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.801000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffced8a8c20 a2=0 a3=7ffced8a8c0c items=0 ppid=2969 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.801000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:21.799000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeb0e07070 a2=0 a3=7ffeb0e0705c items=0 ppid=2969 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.799000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:21.811000 audit[3148]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.811000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcae04ddd0 a2=0 a3=7ffcae04ddbc items=0 ppid=2969 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.811000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:21.812000 audit[3151]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.812000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc90793200 a2=0 a3=7ffc907931ec items=0 ppid=2969 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.812000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:22.141839 env[1067]: time="2024-04-12T18:54:22.140465208Z" level=info msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" Apr 12 18:54:22.258783 systemd-networkd[978]: vxlan.calico: Link UP Apr 12 18:54:22.258792 systemd-networkd[978]: vxlan.calico: Gained carrier Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.256 [INFO][3172] k8s.go 585: Cleaning up netns ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.257 [INFO][3172] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" iface="eth0" netns="/var/run/netns/cni-579ab238-59d0-58e6-a51d-36e07f7ab6c6" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.260 [INFO][3172] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" iface="eth0" netns="/var/run/netns/cni-579ab238-59d0-58e6-a51d-36e07f7ab6c6" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.273 [INFO][3172] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" iface="eth0" netns="/var/run/netns/cni-579ab238-59d0-58e6-a51d-36e07f7ab6c6" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.273 [INFO][3172] k8s.go 592: Releasing IP address(es) ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.273 [INFO][3172] utils.go 188: Calico CNI releasing IP address ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.598 [INFO][3180] ipam_plugin.go 415: Releasing address using handleID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.615 [INFO][3180] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.617 [INFO][3180] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.637 [WARNING][3180] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.637 [INFO][3180] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.639 [INFO][3180] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:22.645789 env[1067]: 2024-04-12 18:54:22.644 [INFO][3172] k8s.go 598: Teardown processing complete. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:22.648858 systemd[1]: run-netns-cni\x2d579ab238\x2d59d0\x2d58e6\x2da51d\x2d36e07f7ab6c6.mount: Deactivated successfully. Apr 12 18:54:22.649812 env[1067]: time="2024-04-12T18:54:22.649759124Z" level=info msg="TearDown network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" successfully" Apr 12 18:54:22.649908 env[1067]: time="2024-04-12T18:54:22.649888353Z" level=info msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" returns successfully" Apr 12 18:54:22.650999 env[1067]: time="2024-04-12T18:54:22.650972399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-d8lfr,Uid:3891506f-6a62-4f94-87d3-0df292e6c43d,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:22.860457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:22.860560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3a0ee6f036d: link becomes ready Apr 12 18:54:22.866872 systemd-networkd[978]: cali3a0ee6f036d: Link UP Apr 12 18:54:22.867188 systemd-networkd[978]: cali3a0ee6f036d: Gained carrier Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.736 [INFO][3188] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0 coredns-76f75df574- kube-system 3891506f-6a62-4f94-87d3-0df292e6c43d 704 0 2024-04-12 18:53:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-d-76b1f6eb3d.novalocal coredns-76f75df574-d8lfr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3a0ee6f036d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.736 [INFO][3188] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.785 [INFO][3202] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" HandleID="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.798 [INFO][3202] ipam_plugin.go 268: Auto assigning IP ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" HandleID="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad820), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-d-76b1f6eb3d.novalocal", "pod":"coredns-76f75df574-d8lfr", "timestamp":"2024-04-12 18:54:22.785065262 +0000 UTC"}, Hostname:"ci-3510-3-3-d-76b1f6eb3d.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.799 [INFO][3202] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.799 [INFO][3202] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.799 [INFO][3202] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d-76b1f6eb3d.novalocal' Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.802 [INFO][3202] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.821 [INFO][3202] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.826 [INFO][3202] ipam.go 489: Trying affinity for 192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.829 [INFO][3202] ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.833 [INFO][3202] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.833 [INFO][3202] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.838 [INFO][3202] ipam.go 1682: Creating new handle: k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.843 [INFO][3202] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.851 [INFO][3202] ipam.go 1216: Successfully claimed IPs: [192.168.125.129/26] block=192.168.125.128/26 handle="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.851 [INFO][3202] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.129/26] handle="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.851 [INFO][3202] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:22.883734 env[1067]: 2024-04-12 18:54:22.851 [INFO][3202] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.129/26] IPv6=[] ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" HandleID="k8s-pod-network.1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.854 [INFO][3188] k8s.go 385: Populated endpoint ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3891506f-6a62-4f94-87d3-0df292e6c43d", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"", Pod:"coredns-76f75df574-d8lfr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3a0ee6f036d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.854 [INFO][3188] k8s.go 386: Calico CNI using IPs: [192.168.125.129/32] ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.854 [INFO][3188] dataplane_linux.go 68: Setting the host side veth name to cali3a0ee6f036d ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.857 [INFO][3188] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.857 [INFO][3188] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3891506f-6a62-4f94-87d3-0df292e6c43d", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d", Pod:"coredns-76f75df574-d8lfr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3a0ee6f036d", MAC:"26:43:d9:f1:41:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:22.884906 env[1067]: 2024-04-12 18:54:22.881 [INFO][3188] k8s.go 498: Wrote updated endpoint to datastore ContainerID="1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d" Namespace="kube-system" Pod="coredns-76f75df574-d8lfr" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:22.903106 env[1067]: time="2024-04-12T18:54:22.902806489Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:22.903106 env[1067]: time="2024-04-12T18:54:22.902854388Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:22.903106 env[1067]: time="2024-04-12T18:54:22.902869537Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:22.903310 env[1067]: time="2024-04-12T18:54:22.903145780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d pid=3226 runtime=io.containerd.runc.v2 Apr 12 18:54:22.927667 systemd[1]: Started cri-containerd-1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d.scope. Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.953000 audit: BPF prog-id=152 op=LOAD Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3226 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623763653531663831396633653961333539313465363034386161 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3226 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623763653531663831396633653961333539313465363034386161 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.954000 audit: BPF prog-id=153 op=LOAD Apr 12 18:54:22.954000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002dbea0 items=0 ppid=3226 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623763653531663831396633653961333539313465363034386161 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit: BPF prog-id=154 op=LOAD Apr 12 18:54:22.956000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002dbee8 items=0 ppid=3226 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623763653531663831396633653961333539313465363034386161 Apr 12 18:54:22.956000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:54:22.956000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.956000 audit: BPF prog-id=155 op=LOAD Apr 12 18:54:22.956000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dc2f8 items=0 ppid=3226 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623763653531663831396633653961333539313465363034386161 Apr 12 18:54:23.002109 env[1067]: time="2024-04-12T18:54:23.002060373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-d8lfr,Uid:3891506f-6a62-4f94-87d3-0df292e6c43d,Namespace:kube-system,Attempt:1,} returns sandbox id \"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d\"" Apr 12 18:54:23.008135 env[1067]: time="2024-04-12T18:54:23.008106134Z" level=info msg="CreateContainer within sandbox \"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:23.047000 audit[3268]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:23.047000 audit[3268]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffe5e58eb60 a2=0 a3=7ffe5e58eb4c items=0 ppid=2969 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:23.051900 env[1067]: time="2024-04-12T18:54:23.051859392Z" level=info msg="CreateContainer within sandbox \"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b80d40b72de8dd57c4bade1713c6d309eab2a1f9aa756011ab7e092a9296ecce\"" Apr 12 18:54:23.052998 env[1067]: time="2024-04-12T18:54:23.052971820Z" level=info msg="StartContainer for \"b80d40b72de8dd57c4bade1713c6d309eab2a1f9aa756011ab7e092a9296ecce\"" Apr 12 18:54:23.078493 systemd[1]: Started cri-containerd-b80d40b72de8dd57c4bade1713c6d309eab2a1f9aa756011ab7e092a9296ecce.scope. Apr 12 18:54:23.139966 env[1067]: time="2024-04-12T18:54:23.139901614Z" level=info msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" Apr 12 18:54:23.140676 env[1067]: time="2024-04-12T18:54:23.140244222Z" level=info msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.207000 audit: BPF prog-id=156 op=LOAD Apr 12 18:54:23.208000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.208000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3226 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238306434306237326465386464353763346261646531373133633664 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3226 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238306434306237326465386464353763346261646531373133633664 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit: BPF prog-id=157 op=LOAD Apr 12 18:54:23.209000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000246740 items=0 ppid=3226 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238306434306237326465386464353763346261646531373133633664 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit: BPF prog-id=158 op=LOAD Apr 12 18:54:23.209000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000246788 items=0 ppid=3226 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238306434306237326465386464353763346261646531373133633664 Apr 12 18:54:23.209000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:54:23.209000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.209000 audit: BPF prog-id=159 op=LOAD Apr 12 18:54:23.209000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000246b98 items=0 ppid=3226 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238306434306237326465386464353763346261646531373133633664 Apr 12 18:54:23.294091 env[1067]: time="2024-04-12T18:54:23.294021813Z" level=info msg="StartContainer for \"b80d40b72de8dd57c4bade1713c6d309eab2a1f9aa756011ab7e092a9296ecce\" returns successfully" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.244 [INFO][3319] k8s.go 585: Cleaning up netns ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.244 [INFO][3319] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" iface="eth0" netns="/var/run/netns/cni-3caa2bf4-cf2c-2c0e-a8c9-7dcf755de4b6" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.245 [INFO][3319] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" iface="eth0" netns="/var/run/netns/cni-3caa2bf4-cf2c-2c0e-a8c9-7dcf755de4b6" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.255 [INFO][3319] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" iface="eth0" netns="/var/run/netns/cni-3caa2bf4-cf2c-2c0e-a8c9-7dcf755de4b6" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.255 [INFO][3319] k8s.go 592: Releasing IP address(es) ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.255 [INFO][3319] utils.go 188: Calico CNI releasing IP address ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.304 [INFO][3343] ipam_plugin.go 415: Releasing address using handleID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.304 [INFO][3343] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.304 [INFO][3343] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.314 [WARNING][3343] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.314 [INFO][3343] ipam_plugin.go 443: Releasing address using workloadID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.318 [INFO][3343] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:23.322539 env[1067]: 2024-04-12 18:54:23.320 [INFO][3319] k8s.go 598: Teardown processing complete. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:23.323117 env[1067]: time="2024-04-12T18:54:23.322684614Z" level=info msg="TearDown network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" successfully" Apr 12 18:54:23.323117 env[1067]: time="2024-04-12T18:54:23.322719950Z" level=info msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" returns successfully" Apr 12 18:54:23.323849 env[1067]: time="2024-04-12T18:54:23.323807882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f87cdc8dd-cfwpd,Uid:62149448-ed26-4de1-be82-84dac9c213c3,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.293 [INFO][3327] k8s.go 585: Cleaning up netns ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.298 [INFO][3327] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" iface="eth0" netns="/var/run/netns/cni-73dacb33-581f-4174-ca25-f1a869cd19a2" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.299 [INFO][3327] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" iface="eth0" netns="/var/run/netns/cni-73dacb33-581f-4174-ca25-f1a869cd19a2" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.299 [INFO][3327] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" iface="eth0" netns="/var/run/netns/cni-73dacb33-581f-4174-ca25-f1a869cd19a2" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.299 [INFO][3327] k8s.go 592: Releasing IP address(es) ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.299 [INFO][3327] utils.go 188: Calico CNI releasing IP address ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.355 [INFO][3347] ipam_plugin.go 415: Releasing address using handleID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.355 [INFO][3347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.355 [INFO][3347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.363 [WARNING][3347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.363 [INFO][3347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.366 [INFO][3347] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:23.369725 env[1067]: 2024-04-12 18:54:23.368 [INFO][3327] k8s.go 598: Teardown processing complete. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:23.370280 env[1067]: time="2024-04-12T18:54:23.369860626Z" level=info msg="TearDown network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" successfully" Apr 12 18:54:23.370280 env[1067]: time="2024-04-12T18:54:23.369895972Z" level=info msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" returns successfully" Apr 12 18:54:23.371081 env[1067]: time="2024-04-12T18:54:23.371048525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-86hdw,Uid:fe9c7123-bb87-4352-a856-546b7767f031,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:23.421861 kubelet[1941]: I0412 18:54:23.421687 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-d8lfr" podStartSLOduration=41.421619127 podStartE2EDuration="41.421619127s" podCreationTimestamp="2024-04-12 18:53:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:23.421068794 +0000 UTC m=+54.437964656" watchObservedRunningTime="2024-04-12 18:54:23.421619127 +0000 UTC m=+54.438514979" Apr 12 18:54:23.461000 audit[3378]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:23.461000 audit[3378]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffdcbef550 a2=0 a3=7fffdcbef53c items=0 ppid=2079 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:23.461000 audit[3378]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:23.461000 audit[3378]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffdcbef550 a2=0 a3=0 items=0 ppid=2079 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:23.626634 systemd-networkd[978]: cali5417f3e5724: Link UP Apr 12 18:54:23.641354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5417f3e5724: link becomes ready Apr 12 18:54:23.628295 systemd-networkd[978]: vxlan.calico: Gained IPv6LL Apr 12 18:54:23.630139 systemd-networkd[978]: cali5417f3e5724: Gained carrier Apr 12 18:54:23.652061 systemd[1]: run-containerd-runc-k8s.io-1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d-runc.SRYxOH.mount: Deactivated successfully. Apr 12 18:54:23.652171 systemd[1]: run-netns-cni\x2d73dacb33\x2d581f\x2d4174\x2dca25\x2df1a869cd19a2.mount: Deactivated successfully. Apr 12 18:54:23.652235 systemd[1]: run-netns-cni\x2d3caa2bf4\x2dcf2c\x2d2c0e\x2da8c9\x2d7dcf755de4b6.mount: Deactivated successfully. Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.477 [INFO][3355] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0 calico-kube-controllers-5f87cdc8dd- calico-system 62149448-ed26-4de1-be82-84dac9c213c3 712 0 2024-04-12 18:53:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5f87cdc8dd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-3-d-76b1f6eb3d.novalocal calico-kube-controllers-5f87cdc8dd-cfwpd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5417f3e5724 [] []}} ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.477 [INFO][3355] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.555 [INFO][3380] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" HandleID="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.571 [INFO][3380] ipam_plugin.go 268: Auto assigning IP ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" HandleID="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029e8a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-d-76b1f6eb3d.novalocal", "pod":"calico-kube-controllers-5f87cdc8dd-cfwpd", "timestamp":"2024-04-12 18:54:23.555869393 +0000 UTC"}, Hostname:"ci-3510-3-3-d-76b1f6eb3d.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.571 [INFO][3380] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.572 [INFO][3380] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.572 [INFO][3380] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d-76b1f6eb3d.novalocal' Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.575 [INFO][3380] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.590 [INFO][3380] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.598 [INFO][3380] ipam.go 489: Trying affinity for 192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.602 [INFO][3380] ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.605 [INFO][3380] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.605 [INFO][3380] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.607 [INFO][3380] ipam.go 1682: Creating new handle: k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60 Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.612 [INFO][3380] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.621 [INFO][3380] ipam.go 1216: Successfully claimed IPs: [192.168.125.130/26] block=192.168.125.128/26 handle="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.621 [INFO][3380] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.130/26] handle="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.621 [INFO][3380] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:23.665640 env[1067]: 2024-04-12 18:54:23.621 [INFO][3380] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.130/26] IPv6=[] ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" HandleID="k8s-pod-network.c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.623 [INFO][3355] k8s.go 385: Populated endpoint ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0", GenerateName:"calico-kube-controllers-5f87cdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"62149448-ed26-4de1-be82-84dac9c213c3", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f87cdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"", Pod:"calico-kube-controllers-5f87cdc8dd-cfwpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5417f3e5724", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.623 [INFO][3355] k8s.go 386: Calico CNI using IPs: [192.168.125.130/32] ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.623 [INFO][3355] dataplane_linux.go 68: Setting the host side veth name to cali5417f3e5724 ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.631 [INFO][3355] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.631 [INFO][3355] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0", GenerateName:"calico-kube-controllers-5f87cdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"62149448-ed26-4de1-be82-84dac9c213c3", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f87cdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60", Pod:"calico-kube-controllers-5f87cdc8dd-cfwpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5417f3e5724", MAC:"1a:48:9f:3a:33:55", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:23.666570 env[1067]: 2024-04-12 18:54:23.662 [INFO][3355] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60" Namespace="calico-system" Pod="calico-kube-controllers-5f87cdc8dd-cfwpd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:23.702774 env[1067]: time="2024-04-12T18:54:23.702707962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:23.703005 env[1067]: time="2024-04-12T18:54:23.702968076Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:23.703108 env[1067]: time="2024-04-12T18:54:23.703084552Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:23.703651 env[1067]: time="2024-04-12T18:54:23.703597054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60 pid=3417 runtime=io.containerd.runc.v2 Apr 12 18:54:23.732516 systemd-networkd[978]: cali0a183d67ec5: Link UP Apr 12 18:54:23.738146 systemd-networkd[978]: cali0a183d67ec5: Gained carrier Apr 12 18:54:23.738958 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a183d67ec5: link becomes ready Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.519 [INFO][3368] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0 csi-node-driver- calico-system fe9c7123-bb87-4352-a856-546b7767f031 713 0 2024-04-12 18:53:48 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-3-d-76b1f6eb3d.novalocal csi-node-driver-86hdw eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0a183d67ec5 [] []}} ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.519 [INFO][3368] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.580 [INFO][3387] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" HandleID="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.599 [INFO][3387] ipam_plugin.go 268: Auto assigning IP ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" HandleID="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-d-76b1f6eb3d.novalocal", "pod":"csi-node-driver-86hdw", "timestamp":"2024-04-12 18:54:23.580583482 +0000 UTC"}, Hostname:"ci-3510-3-3-d-76b1f6eb3d.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.599 [INFO][3387] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.621 [INFO][3387] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.621 [INFO][3387] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d-76b1f6eb3d.novalocal' Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.660 [INFO][3387] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.674 [INFO][3387] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.685 [INFO][3387] ipam.go 489: Trying affinity for 192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.688 [INFO][3387] ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.691 [INFO][3387] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.692 [INFO][3387] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.706 [INFO][3387] ipam.go 1682: Creating new handle: k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1 Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.720 [INFO][3387] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.728 [INFO][3387] ipam.go 1216: Successfully claimed IPs: [192.168.125.131/26] block=192.168.125.128/26 handle="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.728 [INFO][3387] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.131/26] handle="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.728 [INFO][3387] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:23.756690 env[1067]: 2024-04-12 18:54:23.728 [INFO][3387] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.131/26] IPv6=[] ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" HandleID="k8s-pod-network.9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.730 [INFO][3368] k8s.go 385: Populated endpoint ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe9c7123-bb87-4352-a856-546b7767f031", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"", Pod:"csi-node-driver-86hdw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a183d67ec5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.730 [INFO][3368] k8s.go 386: Calico CNI using IPs: [192.168.125.131/32] ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.730 [INFO][3368] dataplane_linux.go 68: Setting the host side veth name to cali0a183d67ec5 ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.739 [INFO][3368] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.739 [INFO][3368] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe9c7123-bb87-4352-a856-546b7767f031", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1", Pod:"csi-node-driver-86hdw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a183d67ec5", MAC:"26:a3:47:f6:bd:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:23.757458 env[1067]: 2024-04-12 18:54:23.754 [INFO][3368] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1" Namespace="calico-system" Pod="csi-node-driver-86hdw" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:23.766684 systemd[1]: Started cri-containerd-c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60.scope. Apr 12 18:54:23.761000 audit[3437]: NETFILTER_CFG table=filter:104 family=2 entries=40 op=nft_register_chain pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:23.761000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffc57f4a740 a2=0 a3=7ffc57f4a72c items=0 ppid=2969 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.761000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:23.785805 env[1067]: time="2024-04-12T18:54:23.785748014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:23.786008 env[1067]: time="2024-04-12T18:54:23.785982189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:23.786112 env[1067]: time="2024-04-12T18:54:23.786089418Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:23.786325 env[1067]: time="2024-04-12T18:54:23.786297405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1 pid=3457 runtime=io.containerd.runc.v2 Apr 12 18:54:23.804639 systemd[1]: Started cri-containerd-9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1.scope. Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.835000 audit: BPF prog-id=160 op=LOAD Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3417 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337353866663134346562323831366165356264323437613038633332 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3417 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337353866663134346562323831366165356264323437613038633332 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit: BPF prog-id=161 op=LOAD Apr 12 18:54:23.838000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c65d0 items=0 ppid=3417 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337353866663134346562323831366165356264323437613038633332 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit: BPF prog-id=162 op=LOAD Apr 12 18:54:23.838000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c6618 items=0 ppid=3417 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337353866663134346562323831366165356264323437613038633332 Apr 12 18:54:23.838000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:54:23.838000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.838000 audit: BPF prog-id=163 op=LOAD Apr 12 18:54:23.838000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6a28 items=0 ppid=3417 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337353866663134346562323831366165356264323437613038633332 Apr 12 18:54:23.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.866000 audit: BPF prog-id=164 op=LOAD Apr 12 18:54:23.868000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.868000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962636461326137353938666639666334333164376636366437313135 Apr 12 18:54:23.868000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.868000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962636461326137353938666639666334333164376636366437313135 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.869000 audit: BPF prog-id=165 op=LOAD Apr 12 18:54:23.869000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6aa0 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962636461326137353938666639666334333164376636366437313135 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.871000 audit: BPF prog-id=166 op=LOAD Apr 12 18:54:23.871000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6ae8 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962636461326137353938666639666334333164376636366437313135 Apr 12 18:54:23.873000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:54:23.873000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:23.873000 audit: BPF prog-id=167 op=LOAD Apr 12 18:54:23.873000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d6ef8 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962636461326137353938666639666334333164376636366437313135 Apr 12 18:54:23.896000 audit[3499]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:23.896000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffdb1213590 a2=0 a3=7ffdb121357c items=0 ppid=2969 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.897791 env[1067]: time="2024-04-12T18:54:23.897738132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-86hdw,Uid:fe9c7123-bb87-4352-a856-546b7767f031,Namespace:calico-system,Attempt:1,} returns sandbox id \"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1\"" Apr 12 18:54:23.896000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:23.902311 env[1067]: time="2024-04-12T18:54:23.902250090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:54:23.941070 env[1067]: time="2024-04-12T18:54:23.941017869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f87cdc8dd-cfwpd,Uid:62149448-ed26-4de1-be82-84dac9c213c3,Namespace:calico-system,Attempt:1,} returns sandbox id \"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60\"" Apr 12 18:54:24.075158 systemd-networkd[978]: cali3a0ee6f036d: Gained IPv6LL Apr 12 18:54:24.437000 audit[3510]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:24.440018 kernel: kauditd_printk_skb: 400 callbacks suppressed Apr 12 18:54:24.440285 kernel: audit: type=1325 audit(1712948064.437:1138): table=filter:106 family=2 entries=11 op=nft_register_rule pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:24.437000 audit[3510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd35ebe770 a2=0 a3=7ffd35ebe75c items=0 ppid=2079 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.447581 kernel: audit: type=1300 audit(1712948064.437:1138): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd35ebe770 a2=0 a3=7ffd35ebe75c items=0 ppid=2079 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.447788 kernel: audit: type=1327 audit(1712948064.437:1138): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:24.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:24.455000 audit[3510]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:24.455000 audit[3510]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd35ebe770 a2=0 a3=7ffd35ebe75c items=0 ppid=2079 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.465034 kernel: audit: type=1325 audit(1712948064.455:1139): table=nat:107 family=2 entries=35 op=nft_register_chain pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:24.465337 kernel: audit: type=1300 audit(1712948064.455:1139): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd35ebe770 a2=0 a3=7ffd35ebe75c items=0 ppid=2079 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.465457 kernel: audit: type=1327 audit(1712948064.455:1139): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:24.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:24.591000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.591000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fd2c30 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:24.607319 kernel: audit: type=1400 audit(1712948064.591:1140): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.607368 kernel: audit: type=1300 audit(1712948064.591:1140): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fd2c30 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:24.607397 kernel: audit: type=1327 audit(1712948064.591:1140): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:24.591000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:24.595000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.616569 kernel: audit: type=1400 audit(1712948064.595:1141): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.595000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d9f260 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:24.595000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:24.649227 systemd[1]: run-containerd-runc-k8s.io-9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1-runc.QIPNwF.mount: Deactivated successfully. Apr 12 18:54:24.843219 systemd-networkd[978]: cali0a183d67ec5: Gained IPv6LL Apr 12 18:54:24.843553 systemd-networkd[978]: cali5417f3e5724: Gained IPv6LL Apr 12 18:54:24.900000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.900000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f7b36e0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.900000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:24.901000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.901000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00de6c570 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:24.902000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.902000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f7af200 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.902000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:24.923000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.923000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ec5ca50 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.923000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:24.942000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.942000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00d908640 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.942000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:24.951000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:24.951000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f1a76e0 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:54:24.951000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:54:25.141188 env[1067]: time="2024-04-12T18:54:25.140008842Z" level=info msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.225 [INFO][3525] k8s.go 585: Cleaning up netns ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.226 [INFO][3525] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" iface="eth0" netns="/var/run/netns/cni-40aba88e-865d-122a-2729-d954237f9514" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.226 [INFO][3525] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" iface="eth0" netns="/var/run/netns/cni-40aba88e-865d-122a-2729-d954237f9514" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.226 [INFO][3525] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" iface="eth0" netns="/var/run/netns/cni-40aba88e-865d-122a-2729-d954237f9514" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.226 [INFO][3525] k8s.go 592: Releasing IP address(es) ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.226 [INFO][3525] utils.go 188: Calico CNI releasing IP address ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.257 [INFO][3531] ipam_plugin.go 415: Releasing address using handleID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.258 [INFO][3531] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.258 [INFO][3531] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.274 [WARNING][3531] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.276 [INFO][3531] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.279 [INFO][3531] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:25.282808 env[1067]: 2024-04-12 18:54:25.280 [INFO][3525] k8s.go 598: Teardown processing complete. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:25.286216 systemd[1]: run-netns-cni\x2d40aba88e\x2d865d\x2d122a\x2d2729\x2dd954237f9514.mount: Deactivated successfully. Apr 12 18:54:25.287459 env[1067]: time="2024-04-12T18:54:25.287378164Z" level=info msg="TearDown network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" successfully" Apr 12 18:54:25.287459 env[1067]: time="2024-04-12T18:54:25.287440319Z" level=info msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" returns successfully" Apr 12 18:54:25.288253 env[1067]: time="2024-04-12T18:54:25.288221913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5txfx,Uid:84611d9b-7ea4-4bac-81d8-363ca715fd18,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:25.913498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount456667203.mount: Deactivated successfully. Apr 12 18:54:26.088879 systemd-networkd[978]: cali1fb2eacbb36: Link UP Apr 12 18:54:26.092493 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:26.092687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1fb2eacbb36: link becomes ready Apr 12 18:54:26.092729 systemd-networkd[978]: cali1fb2eacbb36: Gained carrier Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:25.964 [INFO][3538] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0 coredns-76f75df574- kube-system 84611d9b-7ea4-4bac-81d8-363ca715fd18 737 0 2024-04-12 18:53:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-d-76b1f6eb3d.novalocal coredns-76f75df574-5txfx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1fb2eacbb36 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:25.964 [INFO][3538] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.017 [INFO][3551] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" HandleID="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.029 [INFO][3551] ipam_plugin.go 268: Auto assigning IP ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" HandleID="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000260c70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-d-76b1f6eb3d.novalocal", "pod":"coredns-76f75df574-5txfx", "timestamp":"2024-04-12 18:54:26.017621245 +0000 UTC"}, Hostname:"ci-3510-3-3-d-76b1f6eb3d.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.032 [INFO][3551] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.032 [INFO][3551] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.032 [INFO][3551] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d-76b1f6eb3d.novalocal' Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.035 [INFO][3551] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.041 [INFO][3551] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.050 [INFO][3551] ipam.go 489: Trying affinity for 192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.052 [INFO][3551] ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.055 [INFO][3551] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.055 [INFO][3551] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.058 [INFO][3551] ipam.go 1682: Creating new handle: k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2 Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.070 [INFO][3551] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.079 [INFO][3551] ipam.go 1216: Successfully claimed IPs: [192.168.125.132/26] block=192.168.125.128/26 handle="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.079 [INFO][3551] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.132/26] handle="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.079 [INFO][3551] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:26.110043 env[1067]: 2024-04-12 18:54:26.079 [INFO][3551] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.132/26] IPv6=[] ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" HandleID="k8s-pod-network.2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.083 [INFO][3538] k8s.go 385: Populated endpoint ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"84611d9b-7ea4-4bac-81d8-363ca715fd18", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"", Pod:"coredns-76f75df574-5txfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1fb2eacbb36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.083 [INFO][3538] k8s.go 386: Calico CNI using IPs: [192.168.125.132/32] ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.083 [INFO][3538] dataplane_linux.go 68: Setting the host side veth name to cali1fb2eacbb36 ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.093 [INFO][3538] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.094 [INFO][3538] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"84611d9b-7ea4-4bac-81d8-363ca715fd18", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2", Pod:"coredns-76f75df574-5txfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1fb2eacbb36", MAC:"02:5d:94:6a:db:3a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:26.110739 env[1067]: 2024-04-12 18:54:26.106 [INFO][3538] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2" Namespace="kube-system" Pod="coredns-76f75df574-5txfx" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:26.131000 audit[3574]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:26.131000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffff5d31e20 a2=0 a3=7ffff5d31e0c items=0 ppid=2969 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.131000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:26.142130 env[1067]: time="2024-04-12T18:54:26.142053532Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:26.142514 env[1067]: time="2024-04-12T18:54:26.142101631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:26.142514 env[1067]: time="2024-04-12T18:54:26.142116919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:26.142770 env[1067]: time="2024-04-12T18:54:26.142729760Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2 pid=3578 runtime=io.containerd.runc.v2 Apr 12 18:54:26.164358 systemd[1]: Started cri-containerd-2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2.scope. Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.186000 audit: BPF prog-id=168 op=LOAD Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=3578 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383734303732366230326163346565633361353539353034653133 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=c items=0 ppid=3578 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383734303732366230326163346565633361353539353034653133 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit: BPF prog-id=169 op=LOAD Apr 12 18:54:26.190000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c00037e2a0 items=0 ppid=3578 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383734303732366230326163346565633361353539353034653133 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.190000 audit: BPF prog-id=170 op=LOAD Apr 12 18:54:26.190000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c00037e2e8 items=0 ppid=3578 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383734303732366230326163346565633361353539353034653133 Apr 12 18:54:26.191000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:54:26.191000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.191000 audit: BPF prog-id=171 op=LOAD Apr 12 18:54:26.191000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c00037e6f8 items=0 ppid=3578 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266383734303732366230326163346565633361353539353034653133 Apr 12 18:54:26.248373 env[1067]: time="2024-04-12T18:54:26.248317477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5txfx,Uid:84611d9b-7ea4-4bac-81d8-363ca715fd18,Namespace:kube-system,Attempt:1,} returns sandbox id \"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2\"" Apr 12 18:54:26.255590 env[1067]: time="2024-04-12T18:54:26.255553238Z" level=info msg="CreateContainer within sandbox \"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:26.282433 env[1067]: time="2024-04-12T18:54:26.282380661Z" level=info msg="CreateContainer within sandbox \"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f52a2db7c5e18551f7b90ce82ba323298f1dc961b5e6fe8050d66e8d169a5893\"" Apr 12 18:54:26.284395 env[1067]: time="2024-04-12T18:54:26.284344144Z" level=info msg="StartContainer for \"f52a2db7c5e18551f7b90ce82ba323298f1dc961b5e6fe8050d66e8d169a5893\"" Apr 12 18:54:26.320872 systemd[1]: Started cri-containerd-f52a2db7c5e18551f7b90ce82ba323298f1dc961b5e6fe8050d66e8d169a5893.scope. Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.342000 audit: BPF prog-id=172 op=LOAD Apr 12 18:54:26.344000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.344000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3578 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326132646237633565313835353166376239306365383262613332 Apr 12 18:54:26.344000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.344000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3578 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326132646237633565313835353166376239306365383262613332 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit: BPF prog-id=173 op=LOAD Apr 12 18:54:26.345000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fec80 items=0 ppid=3578 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326132646237633565313835353166376239306365383262613332 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit: BPF prog-id=174 op=LOAD Apr 12 18:54:26.345000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fecc8 items=0 ppid=3578 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326132646237633565313835353166376239306365383262613332 Apr 12 18:54:26.345000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:54:26.345000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.345000 audit: BPF prog-id=175 op=LOAD Apr 12 18:54:26.345000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002ff0d8 items=0 ppid=3578 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326132646237633565313835353166376239306365383262613332 Apr 12 18:54:26.417145 env[1067]: time="2024-04-12T18:54:26.417094617Z" level=info msg="StartContainer for \"f52a2db7c5e18551f7b90ce82ba323298f1dc961b5e6fe8050d66e8d169a5893\" returns successfully" Apr 12 18:54:26.449726 kubelet[1941]: I0412 18:54:26.449499 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-5txfx" podStartSLOduration=44.449454342 podStartE2EDuration="44.449454342s" podCreationTimestamp="2024-04-12 18:53:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:26.447465502 +0000 UTC m=+57.464361374" watchObservedRunningTime="2024-04-12 18:54:26.449454342 +0000 UTC m=+57.466350194" Apr 12 18:54:26.503000 audit[3650]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:26.503000 audit[3650]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd354ae1c0 a2=0 a3=7ffd354ae1ac items=0 ppid=2079 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:26.504000 audit[3650]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:26.504000 audit[3650]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd354ae1c0 a2=0 a3=7ffd354ae1ac items=0 ppid=2079 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:26.692898 env[1067]: time="2024-04-12T18:54:26.692788246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.695649 env[1067]: time="2024-04-12T18:54:26.695589658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.698754 env[1067]: time="2024-04-12T18:54:26.698696889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.702130 env[1067]: time="2024-04-12T18:54:26.701881433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:26.703878 env[1067]: time="2024-04-12T18:54:26.703814931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:54:26.707881 env[1067]: time="2024-04-12T18:54:26.707819602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:54:26.710175 env[1067]: time="2024-04-12T18:54:26.710128988Z" level=info msg="CreateContainer within sandbox \"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:54:26.735087 env[1067]: time="2024-04-12T18:54:26.735007705Z" level=info msg="CreateContainer within sandbox \"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1d792883009a8712e54042beaa81ae7366465cd891c093afe0e952e38679aaf5\"" Apr 12 18:54:26.739138 env[1067]: time="2024-04-12T18:54:26.736287005Z" level=info msg="StartContainer for \"1d792883009a8712e54042beaa81ae7366465cd891c093afe0e952e38679aaf5\"" Apr 12 18:54:26.771780 systemd[1]: Started cri-containerd-1d792883009a8712e54042beaa81ae7366465cd891c093afe0e952e38679aaf5.scope. Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd384f480a8 items=0 ppid=3457 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373932383833303039613837313265353430343262656161383161 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.796000 audit: BPF prog-id=176 op=LOAD Apr 12 18:54:26.796000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9188 items=0 ppid=3457 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373932383833303039613837313265353430343262656161383161 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit: BPF prog-id=177 op=LOAD Apr 12 18:54:26.797000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f91d8 items=0 ppid=3457 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373932383833303039613837313265353430343262656161383161 Apr 12 18:54:26.797000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:54:26.797000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:26.797000 audit: BPF prog-id=178 op=LOAD Apr 12 18:54:26.797000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9268 items=0 ppid=3457 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:26.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373932383833303039613837313265353430343262656161383161 Apr 12 18:54:26.837465 env[1067]: time="2024-04-12T18:54:26.837405457Z" level=info msg="StartContainer for \"1d792883009a8712e54042beaa81ae7366465cd891c093afe0e952e38679aaf5\" returns successfully" Apr 12 18:54:27.489000 audit[3695]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:27.489000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc06cb0750 a2=0 a3=7ffc06cb073c items=0 ppid=2079 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:27.518000 audit[3695]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:27.518000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc06cb0750 a2=0 a3=7ffc06cb073c items=0 ppid=2079 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:27.673987 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.44yUBU.mount: Deactivated successfully. Apr 12 18:54:27.789116 systemd-networkd[978]: cali1fb2eacbb36: Gained IPv6LL Apr 12 18:54:29.157432 env[1067]: time="2024-04-12T18:54:29.157324818Z" level=info msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.271 [WARNING][3736] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0", GenerateName:"calico-kube-controllers-5f87cdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"62149448-ed26-4de1-be82-84dac9c213c3", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f87cdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60", Pod:"calico-kube-controllers-5f87cdc8dd-cfwpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5417f3e5724", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.271 [INFO][3736] k8s.go 585: Cleaning up netns ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.271 [INFO][3736] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" iface="eth0" netns="" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.271 [INFO][3736] k8s.go 592: Releasing IP address(es) ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.271 [INFO][3736] utils.go 188: Calico CNI releasing IP address ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.303 [INFO][3742] ipam_plugin.go 415: Releasing address using handleID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.304 [INFO][3742] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.304 [INFO][3742] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.314 [WARNING][3742] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.314 [INFO][3742] ipam_plugin.go 443: Releasing address using workloadID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.315 [INFO][3742] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.319292 env[1067]: 2024-04-12 18:54:29.318 [INFO][3736] k8s.go 598: Teardown processing complete. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.326316 env[1067]: time="2024-04-12T18:54:29.319307782Z" level=info msg="TearDown network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" successfully" Apr 12 18:54:29.326316 env[1067]: time="2024-04-12T18:54:29.319337047Z" level=info msg="StopPodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" returns successfully" Apr 12 18:54:29.326316 env[1067]: time="2024-04-12T18:54:29.320449728Z" level=info msg="RemovePodSandbox for \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" Apr 12 18:54:29.326316 env[1067]: time="2024-04-12T18:54:29.320476939Z" level=info msg="Forcibly stopping sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\"" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.396 [WARNING][3761] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0", GenerateName:"calico-kube-controllers-5f87cdc8dd-", Namespace:"calico-system", SelfLink:"", UID:"62149448-ed26-4de1-be82-84dac9c213c3", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f87cdc8dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60", Pod:"calico-kube-controllers-5f87cdc8dd-cfwpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5417f3e5724", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.396 [INFO][3761] k8s.go 585: Cleaning up netns ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.396 [INFO][3761] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" iface="eth0" netns="" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.396 [INFO][3761] k8s.go 592: Releasing IP address(es) ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.396 [INFO][3761] utils.go 188: Calico CNI releasing IP address ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.433 [INFO][3767] ipam_plugin.go 415: Releasing address using handleID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.435 [INFO][3767] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.436 [INFO][3767] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.447 [WARNING][3767] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.447 [INFO][3767] ipam_plugin.go 443: Releasing address using workloadID ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" HandleID="k8s-pod-network.684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--kube--controllers--5f87cdc8dd--cfwpd-eth0" Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.450 [INFO][3767] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.467173 env[1067]: 2024-04-12 18:54:29.457 [INFO][3761] k8s.go 598: Teardown processing complete. ContainerID="684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332" Apr 12 18:54:29.467173 env[1067]: time="2024-04-12T18:54:29.466293327Z" level=info msg="TearDown network for sandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" successfully" Apr 12 18:54:29.492665 env[1067]: time="2024-04-12T18:54:29.492605139Z" level=info msg="RemovePodSandbox \"684fb75455b05a993abff5110935b7f7f092f11473482dba1b5428276771e332\" returns successfully" Apr 12 18:54:29.491000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.493896 kernel: kauditd_printk_skb: 192 callbacks suppressed Apr 12 18:54:29.493978 kernel: audit: type=1400 audit(1712948069.491:1195): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.495129 env[1067]: time="2024-04-12T18:54:29.495098081Z" level=info msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" Apr 12 18:54:29.491000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000be72c0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.505488 kernel: audit: type=1300 audit(1712948069.491:1195): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000be72c0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.505674 kernel: audit: type=1327 audit(1712948069.491:1195): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.497000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.518987 kernel: audit: type=1400 audit(1712948069.497:1196): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.497000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000be7300 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.530215 kernel: audit: type=1300 audit(1712948069.497:1196): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000be7300 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.530277 kernel: audit: type=1327 audit(1712948069.497:1196): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.530305 kernel: audit: type=1400 audit(1712948069.497:1197): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.497000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.497000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5f440 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.540552 kernel: audit: type=1300 audit(1712948069.497:1197): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5f440 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.548002 kernel: audit: type=1327 audit(1712948069.497:1197): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.497000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.554130 kernel: audit: type=1400 audit(1712948069.497:1198): avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:29.497000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5f460 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:54:29.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.596 [WARNING][3786] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3891506f-6a62-4f94-87d3-0df292e6c43d", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d", Pod:"coredns-76f75df574-d8lfr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3a0ee6f036d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.596 [INFO][3786] k8s.go 585: Cleaning up netns ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.596 [INFO][3786] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" iface="eth0" netns="" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.596 [INFO][3786] k8s.go 592: Releasing IP address(es) ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.596 [INFO][3786] utils.go 188: Calico CNI releasing IP address ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.630 [INFO][3792] ipam_plugin.go 415: Releasing address using handleID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.630 [INFO][3792] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.630 [INFO][3792] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.644 [WARNING][3792] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.644 [INFO][3792] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.650 [INFO][3792] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.652930 env[1067]: 2024-04-12 18:54:29.651 [INFO][3786] k8s.go 598: Teardown processing complete. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.653553 env[1067]: time="2024-04-12T18:54:29.653521648Z" level=info msg="TearDown network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" successfully" Apr 12 18:54:29.653631 env[1067]: time="2024-04-12T18:54:29.653611967Z" level=info msg="StopPodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" returns successfully" Apr 12 18:54:29.654305 env[1067]: time="2024-04-12T18:54:29.654269772Z" level=info msg="RemovePodSandbox for \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" Apr 12 18:54:29.654441 env[1067]: time="2024-04-12T18:54:29.654398060Z" level=info msg="Forcibly stopping sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\"" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.700 [WARNING][3811] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3891506f-6a62-4f94-87d3-0df292e6c43d", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"1fb7ce51f819f3e9a35914e6048aacfd7255852e97c17ee97ae8b654ba13df1d", Pod:"coredns-76f75df574-d8lfr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3a0ee6f036d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.700 [INFO][3811] k8s.go 585: Cleaning up netns ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.700 [INFO][3811] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" iface="eth0" netns="" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.700 [INFO][3811] k8s.go 592: Releasing IP address(es) ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.700 [INFO][3811] utils.go 188: Calico CNI releasing IP address ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.721 [INFO][3817] ipam_plugin.go 415: Releasing address using handleID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.722 [INFO][3817] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.722 [INFO][3817] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.730 [WARNING][3817] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.730 [INFO][3817] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" HandleID="k8s-pod-network.3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--d8lfr-eth0" Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.732 [INFO][3817] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.737753 env[1067]: 2024-04-12 18:54:29.734 [INFO][3811] k8s.go 598: Teardown processing complete. ContainerID="3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b" Apr 12 18:54:29.739434 env[1067]: time="2024-04-12T18:54:29.738286942Z" level=info msg="TearDown network for sandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" successfully" Apr 12 18:54:29.741888 env[1067]: time="2024-04-12T18:54:29.741853070Z" level=info msg="RemovePodSandbox \"3b05b5135b808fd60ed0a671151f5375f798e89159fe6caaa2090566dfeafa4b\" returns successfully" Apr 12 18:54:29.742497 env[1067]: time="2024-04-12T18:54:29.742473967Z" level=info msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.788 [WARNING][3835] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe9c7123-bb87-4352-a856-546b7767f031", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1", Pod:"csi-node-driver-86hdw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a183d67ec5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.788 [INFO][3835] k8s.go 585: Cleaning up netns ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.789 [INFO][3835] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" iface="eth0" netns="" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.789 [INFO][3835] k8s.go 592: Releasing IP address(es) ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.789 [INFO][3835] utils.go 188: Calico CNI releasing IP address ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.814 [INFO][3841] ipam_plugin.go 415: Releasing address using handleID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.814 [INFO][3841] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.814 [INFO][3841] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.824 [WARNING][3841] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.824 [INFO][3841] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.826 [INFO][3841] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.829843 env[1067]: 2024-04-12 18:54:29.828 [INFO][3835] k8s.go 598: Teardown processing complete. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.831181 env[1067]: time="2024-04-12T18:54:29.829859557Z" level=info msg="TearDown network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" successfully" Apr 12 18:54:29.831181 env[1067]: time="2024-04-12T18:54:29.829902598Z" level=info msg="StopPodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" returns successfully" Apr 12 18:54:29.831681 env[1067]: time="2024-04-12T18:54:29.831650131Z" level=info msg="RemovePodSandbox for \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" Apr 12 18:54:29.831896 env[1067]: time="2024-04-12T18:54:29.831828773Z" level=info msg="Forcibly stopping sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\"" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.879 [WARNING][3859] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe9c7123-bb87-4352-a856-546b7767f031", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1", Pod:"csi-node-driver-86hdw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a183d67ec5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.880 [INFO][3859] k8s.go 585: Cleaning up netns ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.880 [INFO][3859] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" iface="eth0" netns="" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.880 [INFO][3859] k8s.go 592: Releasing IP address(es) ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.880 [INFO][3859] utils.go 188: Calico CNI releasing IP address ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.911 [INFO][3865] ipam_plugin.go 415: Releasing address using handleID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.911 [INFO][3865] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.911 [INFO][3865] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.918 [WARNING][3865] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.918 [INFO][3865] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" HandleID="k8s-pod-network.fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-csi--node--driver--86hdw-eth0" Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.919 [INFO][3865] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:29.922718 env[1067]: 2024-04-12 18:54:29.921 [INFO][3859] k8s.go 598: Teardown processing complete. ContainerID="fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75" Apr 12 18:54:29.923237 env[1067]: time="2024-04-12T18:54:29.922749305Z" level=info msg="TearDown network for sandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" successfully" Apr 12 18:54:29.926402 env[1067]: time="2024-04-12T18:54:29.926363984Z" level=info msg="RemovePodSandbox \"fac9179ae5a3c56936ed98dd257de26849c30bdf965df3c6efa5eff154220f75\" returns successfully" Apr 12 18:54:29.926954 env[1067]: time="2024-04-12T18:54:29.926888771Z" level=info msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:29.993 [WARNING][3885] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"84611d9b-7ea4-4bac-81d8-363ca715fd18", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2", Pod:"coredns-76f75df574-5txfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1fb2eacbb36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:29.993 [INFO][3885] k8s.go 585: Cleaning up netns ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:29.993 [INFO][3885] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" iface="eth0" netns="" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:29.993 [INFO][3885] k8s.go 592: Releasing IP address(es) ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:29.993 [INFO][3885] utils.go 188: Calico CNI releasing IP address ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.033 [INFO][3891] ipam_plugin.go 415: Releasing address using handleID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.034 [INFO][3891] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.034 [INFO][3891] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.042 [WARNING][3891] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.042 [INFO][3891] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.044 [INFO][3891] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:30.057578 env[1067]: 2024-04-12 18:54:30.045 [INFO][3885] k8s.go 598: Teardown processing complete. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.058245 env[1067]: time="2024-04-12T18:54:30.058212590Z" level=info msg="TearDown network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" successfully" Apr 12 18:54:30.058324 env[1067]: time="2024-04-12T18:54:30.058305333Z" level=info msg="StopPodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" returns successfully" Apr 12 18:54:30.062557 env[1067]: time="2024-04-12T18:54:30.062526713Z" level=info msg="RemovePodSandbox for \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" Apr 12 18:54:30.067893 env[1067]: time="2024-04-12T18:54:30.067847009Z" level=info msg="Forcibly stopping sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\"" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.139 [WARNING][3912] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"84611d9b-7ea4-4bac-81d8-363ca715fd18", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"2f8740726b02ac4eec3a559504e1358df9c38068404f73efdf282fedc9a0fbd2", Pod:"coredns-76f75df574-5txfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1fb2eacbb36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.139 [INFO][3912] k8s.go 585: Cleaning up netns ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.139 [INFO][3912] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" iface="eth0" netns="" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.139 [INFO][3912] k8s.go 592: Releasing IP address(es) ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.139 [INFO][3912] utils.go 188: Calico CNI releasing IP address ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.166 [INFO][3918] ipam_plugin.go 415: Releasing address using handleID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.166 [INFO][3918] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.166 [INFO][3918] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.177 [WARNING][3918] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.177 [INFO][3918] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" HandleID="k8s-pod-network.0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-coredns--76f75df574--5txfx-eth0" Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.180 [INFO][3918] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:30.183222 env[1067]: 2024-04-12 18:54:30.181 [INFO][3912] k8s.go 598: Teardown processing complete. ContainerID="0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc" Apr 12 18:54:30.183999 env[1067]: time="2024-04-12T18:54:30.183966193Z" level=info msg="TearDown network for sandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" successfully" Apr 12 18:54:30.187602 env[1067]: time="2024-04-12T18:54:30.187576305Z" level=info msg="RemovePodSandbox \"0bae01cf77676f918f6e1fa5deeff286cbd3f18fc19928f6576a704dc4526fbc\" returns successfully" Apr 12 18:54:32.092584 env[1067]: time="2024-04-12T18:54:32.092517854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:32.095556 env[1067]: time="2024-04-12T18:54:32.095504858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:32.098714 env[1067]: time="2024-04-12T18:54:32.098670033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:32.102655 env[1067]: time="2024-04-12T18:54:32.102613298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:32.103724 env[1067]: time="2024-04-12T18:54:32.103680587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:54:32.106185 env[1067]: time="2024-04-12T18:54:32.105504022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:54:32.137000 env[1067]: time="2024-04-12T18:54:32.136932895Z" level=info msg="CreateContainer within sandbox \"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:54:32.151186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1273096899.mount: Deactivated successfully. Apr 12 18:54:32.159718 env[1067]: time="2024-04-12T18:54:32.159646974Z" level=info msg="CreateContainer within sandbox \"c758ff144eb2816ae5bd247a08c328f44f779907553ff4c648d93bab21233d60\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca\"" Apr 12 18:54:32.162090 env[1067]: time="2024-04-12T18:54:32.160333633Z" level=info msg="StartContainer for \"ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca\"" Apr 12 18:54:32.186312 systemd[1]: Started cri-containerd-ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca.scope. Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.203000 audit: BPF prog-id=179 op=LOAD Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3417 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:32.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336230623135633765396330663764366239323738386533386661 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3417 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:32.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336230623135633765396330663764366239323738386533386661 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.204000 audit: BPF prog-id=180 op=LOAD Apr 12 18:54:32.204000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a4d40 items=0 ppid=3417 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:32.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336230623135633765396330663764366239323738386533386661 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit: BPF prog-id=181 op=LOAD Apr 12 18:54:32.205000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a4d88 items=0 ppid=3417 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:32.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336230623135633765396330663764366239323738386533386661 Apr 12 18:54:32.205000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:54:32.205000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:32.205000 audit: BPF prog-id=182 op=LOAD Apr 12 18:54:32.205000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a5198 items=0 ppid=3417 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:32.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336230623135633765396330663764366239323738386533386661 Apr 12 18:54:32.255112 env[1067]: time="2024-04-12T18:54:32.255023259Z" level=info msg="StartContainer for \"ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca\" returns successfully" Apr 12 18:54:32.475667 kubelet[1941]: I0412 18:54:32.475182 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5f87cdc8dd-cfwpd" podStartSLOduration=35.312557865 podStartE2EDuration="43.475086827s" podCreationTimestamp="2024-04-12 18:53:49 +0000 UTC" firstStartedPulling="2024-04-12 18:54:23.942510064 +0000 UTC m=+54.959405906" lastFinishedPulling="2024-04-12 18:54:32.105039026 +0000 UTC m=+63.121934868" observedRunningTime="2024-04-12 18:54:32.470490126 +0000 UTC m=+63.487386068" watchObservedRunningTime="2024-04-12 18:54:32.475086827 +0000 UTC m=+63.491982719" Apr 12 18:54:33.076494 systemd[1]: Started sshd@7-172.24.4.50:22-172.24.4.1:58880.service. Apr 12 18:54:33.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.50:22-172.24.4.1:58880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:34.832000 audit[3998]: USER_ACCT pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.835149 kernel: kauditd_printk_skb: 60 callbacks suppressed Apr 12 18:54:34.835201 kernel: audit: type=1101 audit(1712948074.832:1218): pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.835229 sshd[3998]: Accepted publickey for core from 172.24.4.1 port 58880 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:54:34.843000 audit[3998]: CRED_ACQ pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.853402 kernel: audit: type=1103 audit(1712948074.843:1219): pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.853457 kernel: audit: type=1006 audit(1712948074.843:1220): pid=3998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:54:34.858589 kernel: audit: type=1300 audit(1712948074.843:1220): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4f010390 a2=3 a3=0 items=0 ppid=1 pid=3998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.843000 audit[3998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4f010390 a2=3 a3=0 items=0 ppid=1 pid=3998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:34.861516 kernel: audit: type=1327 audit(1712948074.843:1220): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:34.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:34.860889 sshd[3998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:34.871451 systemd[1]: Started session-8.scope. Apr 12 18:54:34.872670 systemd-logind[1049]: New session 8 of user core. Apr 12 18:54:34.883000 audit[3998]: USER_START pid=3998 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.891112 kernel: audit: type=1105 audit(1712948074.883:1221): pid=3998 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.891277 kernel: audit: type=1103 audit(1712948074.889:1222): pid=4000 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:34.889000 audit[4000]: CRED_ACQ pid=4000 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:35.350746 env[1067]: time="2024-04-12T18:54:35.350648111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:35.359323 env[1067]: time="2024-04-12T18:54:35.359265160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:35.371468 env[1067]: time="2024-04-12T18:54:35.371397730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:35.377048 env[1067]: time="2024-04-12T18:54:35.376979502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:35.377834 env[1067]: time="2024-04-12T18:54:35.377645824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:54:35.392233 env[1067]: time="2024-04-12T18:54:35.392084353Z" level=info msg="CreateContainer within sandbox \"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:54:35.475122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1723722723.mount: Deactivated successfully. Apr 12 18:54:35.486145 env[1067]: time="2024-04-12T18:54:35.485325228Z" level=info msg="CreateContainer within sandbox \"9bcda2a7598ff9fc431d7f66d7115ea6a33419b72ac19d7cf119175d06e755d1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"820b7ecef1f585b9b5d472cb037c1cbf4c03beaed1e53df66fa084428996b2aa\"" Apr 12 18:54:35.490010 env[1067]: time="2024-04-12T18:54:35.489904372Z" level=info msg="StartContainer for \"820b7ecef1f585b9b5d472cb037c1cbf4c03beaed1e53df66fa084428996b2aa\"" Apr 12 18:54:35.547162 systemd[1]: Started cri-containerd-820b7ecef1f585b9b5d472cb037c1cbf4c03beaed1e53df66fa084428996b2aa.scope. Apr 12 18:54:35.554713 systemd[1]: run-containerd-runc-k8s.io-820b7ecef1f585b9b5d472cb037c1cbf4c03beaed1e53df66fa084428996b2aa-runc.90d6Eh.mount: Deactivated successfully. Apr 12 18:54:35.592000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.592000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fa2510a5738 items=0 ppid=3457 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.610629 kernel: audit: type=1400 audit(1712948075.592:1223): avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.610734 kernel: audit: type=1300 audit(1712948075.592:1223): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fa2510a5738 items=0 ppid=3457 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.610761 kernel: audit: type=1327 audit(1712948075.592:1223): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306237656365663166353835623962356434373263623033376331 Apr 12 18:54:35.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306237656365663166353835623962356434373263623033376331 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.596000 audit: BPF prog-id=183 op=LOAD Apr 12 18:54:35.596000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003d6518 items=0 ppid=3457 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306237656365663166353835623962356434373263623033376331 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.597000 audit: BPF prog-id=184 op=LOAD Apr 12 18:54:35.597000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003d6568 items=0 ppid=3457 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306237656365663166353835623962356434373263623033376331 Apr 12 18:54:35.614000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:54:35.614000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:35.614000 audit: BPF prog-id=185 op=LOAD Apr 12 18:54:35.614000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003d65f8 items=0 ppid=3457 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:35.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306237656365663166353835623962356434373263623033376331 Apr 12 18:54:35.652053 env[1067]: time="2024-04-12T18:54:35.652005447Z" level=info msg="StartContainer for \"820b7ecef1f585b9b5d472cb037c1cbf4c03beaed1e53df66fa084428996b2aa\" returns successfully" Apr 12 18:54:35.984043 sshd[3998]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:35.987000 audit[3998]: USER_END pid=3998 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:35.988000 audit[3998]: CRED_DISP pid=3998 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:35.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.50:22-172.24.4.1:58880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:35.991958 systemd[1]: sshd@7-172.24.4.50:22-172.24.4.1:58880.service: Deactivated successfully. Apr 12 18:54:35.993501 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:54:35.995913 systemd-logind[1049]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:54:35.999097 systemd-logind[1049]: Removed session 8. Apr 12 18:54:36.332202 kubelet[1941]: I0412 18:54:36.332115 1941 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:54:36.336443 kubelet[1941]: I0412 18:54:36.336356 1941 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:54:36.519029 kubelet[1941]: I0412 18:54:36.518898 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-86hdw" podStartSLOduration=37.038298458 podStartE2EDuration="48.518683129s" podCreationTimestamp="2024-04-12 18:53:48 +0000 UTC" firstStartedPulling="2024-04-12 18:54:23.900012641 +0000 UTC m=+54.916908503" lastFinishedPulling="2024-04-12 18:54:35.380397282 +0000 UTC m=+66.397293174" observedRunningTime="2024-04-12 18:54:36.514838283 +0000 UTC m=+67.531734205" watchObservedRunningTime="2024-04-12 18:54:36.518683129 +0000 UTC m=+67.535579061" Apr 12 18:54:39.011676 systemd[1]: run-containerd-runc-k8s.io-ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca-runc.dDfBYu.mount: Deactivated successfully. Apr 12 18:54:41.001390 systemd[1]: Started sshd@8-172.24.4.50:22-172.24.4.1:51734.service. Apr 12 18:54:41.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.50:22-172.24.4.1:51734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:41.005889 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 18:54:41.006159 kernel: audit: type=1130 audit(1712948081.002:1232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.50:22-172.24.4.1:51734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:42.478000 audit[4072]: USER_ACCT pid=4072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.480147 sshd[4072]: Accepted publickey for core from 172.24.4.1 port 51734 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:54:42.492000 audit[4072]: CRED_ACQ pid=4072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.496502 sshd[4072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:42.506326 kernel: audit: type=1101 audit(1712948082.478:1233): pid=4072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.506538 kernel: audit: type=1103 audit(1712948082.492:1234): pid=4072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.507825 kernel: audit: type=1006 audit(1712948082.493:1235): pid=4072 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:54:42.493000 audit[4072]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ff7f1a0 a2=3 a3=0 items=0 ppid=1 pid=4072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.532439 systemd-logind[1049]: New session 9 of user core. Apr 12 18:54:42.493000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:42.532830 systemd[1]: Started session-9.scope. Apr 12 18:54:42.540098 kernel: audit: type=1300 audit(1712948082.493:1235): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ff7f1a0 a2=3 a3=0 items=0 ppid=1 pid=4072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:42.540270 kernel: audit: type=1327 audit(1712948082.493:1235): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:42.548000 audit[4072]: USER_START pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.560953 kernel: audit: type=1105 audit(1712948082.548:1236): pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.560000 audit[4080]: CRED_ACQ pid=4080 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:42.566934 kernel: audit: type=1103 audit(1712948082.560:1237): pid=4080 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:43.459331 sshd[4072]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:43.460000 audit[4072]: USER_END pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:43.468620 systemd[1]: sshd@8-172.24.4.50:22-172.24.4.1:51734.service: Deactivated successfully. Apr 12 18:54:43.468976 kernel: audit: type=1106 audit(1712948083.460:1238): pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:43.469620 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:54:43.493732 kernel: audit: type=1104 audit(1712948083.460:1239): pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:43.460000 audit[4072]: CRED_DISP pid=4072 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:43.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.50:22-172.24.4.1:51734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:43.471482 systemd-logind[1049]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:54:43.482979 systemd-logind[1049]: Removed session 9. Apr 12 18:54:48.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.50:22-172.24.4.1:44554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:48.469435 systemd[1]: Started sshd@9-172.24.4.50:22-172.24.4.1:44554.service. Apr 12 18:54:48.472422 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:54:48.472526 kernel: audit: type=1130 audit(1712948088.468:1241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.50:22-172.24.4.1:44554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:49.856427 sshd[4099]: Accepted publickey for core from 172.24.4.1 port 44554 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:54:49.855000 audit[4099]: USER_ACCT pid=4099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.867046 kernel: audit: type=1101 audit(1712948089.855:1242): pid=4099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.865000 audit[4099]: CRED_ACQ pid=4099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.880386 sshd[4099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:49.886291 kernel: audit: type=1103 audit(1712948089.865:1243): pid=4099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.886450 kernel: audit: type=1006 audit(1712948089.865:1244): pid=4099 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:54:49.886534 kernel: audit: type=1300 audit(1712948089.865:1244): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd13f40450 a2=3 a3=0 items=0 ppid=1 pid=4099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.865000 audit[4099]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd13f40450 a2=3 a3=0 items=0 ppid=1 pid=4099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:49.865000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:49.907006 kernel: audit: type=1327 audit(1712948089.865:1244): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:49.906173 systemd-logind[1049]: New session 10 of user core. Apr 12 18:54:49.907146 systemd[1]: Started session-10.scope. Apr 12 18:54:49.920000 audit[4099]: USER_START pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.928084 kernel: audit: type=1105 audit(1712948089.920:1245): pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.928247 kernel: audit: type=1103 audit(1712948089.926:1246): pid=4102 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:49.926000 audit[4102]: CRED_ACQ pid=4102 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:50.992492 sshd[4099]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:51.098000 audit[4099]: USER_END pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:51.121360 kernel: audit: type=1106 audit(1712948091.098:1247): pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:51.121485 kernel: audit: type=1104 audit(1712948091.098:1248): pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:51.098000 audit[4099]: CRED_DISP pid=4099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:51.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.50:22-172.24.4.1:44554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:51.102753 systemd-logind[1049]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:54:51.105413 systemd[1]: sshd@9-172.24.4.50:22-172.24.4.1:44554.service: Deactivated successfully. Apr 12 18:54:51.106890 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:54:51.109671 systemd-logind[1049]: Removed session 10. Apr 12 18:54:55.934428 systemd[1]: Started sshd@10-172.24.4.50:22-172.24.4.1:33396.service. Apr 12 18:54:55.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.50:22-172.24.4.1:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:55.942081 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:54:55.942212 kernel: audit: type=1130 audit(1712948095.937:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.50:22-172.24.4.1:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:57.475000 audit[4119]: USER_ACCT pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.476889 sshd[4119]: Accepted publickey for core from 172.24.4.1 port 33396 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:54:57.477000 audit[4119]: CRED_ACQ pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.495901 sshd[4119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:57.504653 kernel: audit: type=1101 audit(1712948097.475:1251): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.504736 kernel: audit: type=1103 audit(1712948097.477:1252): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.477000 audit[4119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d8100f0 a2=3 a3=0 items=0 ppid=1 pid=4119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:57.515292 kernel: audit: type=1006 audit(1712948097.477:1253): pid=4119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:54:57.515455 kernel: audit: type=1300 audit(1712948097.477:1253): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d8100f0 a2=3 a3=0 items=0 ppid=1 pid=4119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:57.519993 kernel: audit: type=1327 audit(1712948097.477:1253): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:57.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:57.520873 systemd-logind[1049]: New session 11 of user core. Apr 12 18:54:57.521421 systemd[1]: Started session-11.scope. Apr 12 18:54:57.530000 audit[4119]: USER_START pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.530000 audit[4121]: CRED_ACQ pid=4121 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.551906 kernel: audit: type=1105 audit(1712948097.530:1254): pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.552148 kernel: audit: type=1103 audit(1712948097.530:1255): pid=4121 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:57.685061 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.oxWJh3.mount: Deactivated successfully. Apr 12 18:54:58.258451 sshd[4119]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:58.259000 audit[4119]: USER_END pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:58.261688 systemd[1]: Started sshd@11-172.24.4.50:22-172.24.4.1:33400.service. Apr 12 18:54:58.276554 kernel: audit: type=1106 audit(1712948098.259:1256): pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:58.276733 kernel: audit: type=1104 audit(1712948098.259:1257): pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:58.259000 audit[4119]: CRED_DISP pid=4119 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:58.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.50:22-172.24.4.1:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:58.286724 systemd[1]: sshd@10-172.24.4.50:22-172.24.4.1:33396.service: Deactivated successfully. Apr 12 18:54:58.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.50:22-172.24.4.1:33396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:58.288561 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:54:58.289992 systemd-logind[1049]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:54:58.292307 systemd-logind[1049]: Removed session 11. Apr 12 18:54:59.765000 audit[4153]: USER_ACCT pid=4153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:59.767059 sshd[4153]: Accepted publickey for core from 172.24.4.1 port 33400 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:54:59.768000 audit[4153]: CRED_ACQ pid=4153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:59.768000 audit[4153]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee66f97e0 a2=3 a3=0 items=0 ppid=1 pid=4153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:59.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:59.770997 sshd[4153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:59.782529 systemd-logind[1049]: New session 12 of user core. Apr 12 18:54:59.783326 systemd[1]: Started session-12.scope. Apr 12 18:54:59.797000 audit[4153]: USER_START pid=4153 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:54:59.801000 audit[4156]: CRED_ACQ pid=4156 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:00.953618 update_engine[1050]: I0412 18:55:00.953362 1050 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 18:55:00.953618 update_engine[1050]: I0412 18:55:00.953476 1050 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 18:55:00.986018 update_engine[1050]: I0412 18:55:00.985544 1050 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 18:55:00.987664 update_engine[1050]: I0412 18:55:00.987032 1050 omaha_request_params.cc:62] Current group set to lts Apr 12 18:55:01.009141 update_engine[1050]: I0412 18:55:01.009092 1050 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 18:55:01.009428 update_engine[1050]: I0412 18:55:01.009402 1050 update_attempter.cc:643] Scheduling an action processor start. Apr 12 18:55:01.016278 update_engine[1050]: I0412 18:55:01.016085 1050 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:55:01.021497 update_engine[1050]: I0412 18:55:01.021158 1050 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 18:55:01.021497 update_engine[1050]: I0412 18:55:01.021320 1050 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:55:01.021497 update_engine[1050]: I0412 18:55:01.021334 1050 omaha_request_action.cc:271] Request: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: Apr 12 18:55:01.021497 update_engine[1050]: I0412 18:55:01.021343 1050 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:55:01.084298 update_engine[1050]: I0412 18:55:01.084239 1050 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:55:01.084516 update_engine[1050]: E0412 18:55:01.084465 1050 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:55:01.084625 update_engine[1050]: I0412 18:55:01.084587 1050 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 18:55:01.281866 locksmithd[1099]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 18:55:01.441327 sshd[4153]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:01.447396 systemd[1]: Started sshd@12-172.24.4.50:22-172.24.4.1:33408.service. Apr 12 18:55:01.454087 kernel: kauditd_printk_skb: 9 callbacks suppressed Apr 12 18:55:01.454192 kernel: audit: type=1130 audit(1712948101.446:1265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.50:22-172.24.4.1:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.50:22-172.24.4.1:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.466000 audit[4153]: USER_END pid=4153 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:01.486137 kernel: audit: type=1106 audit(1712948101.466:1266): pid=4153 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:01.489774 kernel: audit: type=1104 audit(1712948101.466:1267): pid=4153 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:01.466000 audit[4153]: CRED_DISP pid=4153 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:01.525379 systemd[1]: sshd@11-172.24.4.50:22-172.24.4.1:33400.service: Deactivated successfully. Apr 12 18:55:01.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.50:22-172.24.4.1:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.527998 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:55:01.542690 kernel: audit: type=1131 audit(1712948101.525:1268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.50:22-172.24.4.1:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.540450 systemd-logind[1049]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:55:01.546101 systemd-logind[1049]: Removed session 12. Apr 12 18:55:03.038000 audit[4164]: USER_ACCT pid=4164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.042009 sshd[4164]: Accepted publickey for core from 172.24.4.1 port 33408 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:03.039000 audit[4164]: CRED_ACQ pid=4164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.061201 kernel: audit: type=1101 audit(1712948103.038:1269): pid=4164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.061499 kernel: audit: type=1103 audit(1712948103.039:1270): pid=4164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.061581 kernel: audit: type=1006 audit(1712948103.039:1271): pid=4164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:55:03.039000 audit[4164]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7f96ae40 a2=3 a3=0 items=0 ppid=1 pid=4164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:03.073154 kernel: audit: type=1300 audit(1712948103.039:1271): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7f96ae40 a2=3 a3=0 items=0 ppid=1 pid=4164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:03.073233 kernel: audit: type=1327 audit(1712948103.039:1271): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:03.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:03.094001 sshd[4164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:03.126722 systemd-logind[1049]: New session 13 of user core. Apr 12 18:55:03.127161 systemd[1]: Started session-13.scope. Apr 12 18:55:03.131000 audit[4164]: USER_START pid=4164 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.137941 kernel: audit: type=1105 audit(1712948103.131:1272): pid=4164 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.137000 audit[4177]: CRED_ACQ pid=4177 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.977075 sshd[4164]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:03.978000 audit[4164]: USER_END pid=4164 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.979000 audit[4164]: CRED_DISP pid=4164 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:03.982572 systemd[1]: sshd@12-172.24.4.50:22-172.24.4.1:33408.service: Deactivated successfully. Apr 12 18:55:03.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.50:22-172.24.4.1:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:03.983999 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:55:03.984792 systemd-logind[1049]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:55:03.989335 systemd-logind[1049]: Removed session 13. Apr 12 18:55:08.992341 systemd[1]: Started sshd@13-172.24.4.50:22-172.24.4.1:52354.service. Apr 12 18:55:08.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.50:22-172.24.4.1:52354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:08.997281 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 18:55:08.997429 kernel: audit: type=1130 audit(1712948108.992:1277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.50:22-172.24.4.1:52354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:09.060754 systemd[1]: run-containerd-runc-k8s.io-ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca-runc.LToExx.mount: Deactivated successfully. Apr 12 18:55:10.563000 audit[4195]: USER_ACCT pid=4195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.568254 sshd[4195]: Accepted publickey for core from 172.24.4.1 port 52354 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:10.576030 kernel: audit: type=1101 audit(1712948110.563:1278): pid=4195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.578000 audit[4195]: CRED_ACQ pid=4195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.589971 kernel: audit: type=1103 audit(1712948110.578:1279): pid=4195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.590089 kernel: audit: type=1006 audit(1712948110.578:1280): pid=4195 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:55:10.590958 sshd[4195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:10.578000 audit[4195]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a25ebf0 a2=3 a3=0 items=0 ppid=1 pid=4195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.612969 kernel: audit: type=1300 audit(1712948110.578:1280): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a25ebf0 a2=3 a3=0 items=0 ppid=1 pid=4195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.620677 systemd[1]: Started session-14.scope. Apr 12 18:55:10.621261 systemd-logind[1049]: New session 14 of user core. Apr 12 18:55:10.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:10.631952 kernel: audit: type=1327 audit(1712948110.578:1280): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:10.637000 audit[4195]: USER_START pid=4195 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.644000 audit[4217]: CRED_ACQ pid=4217 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.649990 kernel: audit: type=1105 audit(1712948110.637:1281): pid=4195 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:10.650103 kernel: audit: type=1103 audit(1712948110.644:1282): pid=4217 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:11.469597 sshd[4195]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:11.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.50:22-172.24.4.1:52358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.478797 systemd[1]: Started sshd@14-172.24.4.50:22-172.24.4.1:52358.service. Apr 12 18:55:11.490029 kernel: audit: type=1130 audit(1712948111.478:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.50:22-172.24.4.1:52358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.514146 kernel: audit: type=1106 audit(1712948111.497:1284): pid=4195 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:11.497000 audit[4195]: USER_END pid=4195 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:11.498000 audit[4195]: CRED_DISP pid=4195 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:11.518360 systemd[1]: sshd@13-172.24.4.50:22-172.24.4.1:52354.service: Deactivated successfully. Apr 12 18:55:11.520423 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:55:11.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.50:22-172.24.4.1:52354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.523023 systemd-logind[1049]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:55:11.527148 systemd-logind[1049]: Removed session 14. Apr 12 18:55:11.725738 update_engine[1050]: I0412 18:55:11.725375 1050 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:55:11.726626 update_engine[1050]: I0412 18:55:11.725780 1050 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:55:11.726626 update_engine[1050]: E0412 18:55:11.726025 1050 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:55:11.726626 update_engine[1050]: I0412 18:55:11.726181 1050 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 18:55:12.724526 sshd[4226]: Accepted publickey for core from 172.24.4.1 port 52358 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:12.723000 audit[4226]: USER_ACCT pid=4226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:12.725000 audit[4226]: CRED_ACQ pid=4226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:12.726000 audit[4226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff548316f0 a2=3 a3=0 items=0 ppid=1 pid=4226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:12.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:12.728524 sshd[4226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:12.739740 systemd-logind[1049]: New session 15 of user core. Apr 12 18:55:12.740499 systemd[1]: Started session-15.scope. Apr 12 18:55:12.755000 audit[4226]: USER_START pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:12.759000 audit[4231]: CRED_ACQ pid=4231 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:14.236781 systemd[1]: Started sshd@15-172.24.4.50:22-172.24.4.1:52372.service. Apr 12 18:55:14.251235 kernel: kauditd_printk_skb: 9 callbacks suppressed Apr 12 18:55:14.251365 kernel: audit: type=1130 audit(1712948114.236:1292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.50:22-172.24.4.1:52372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:14.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.50:22-172.24.4.1:52372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:14.334173 sshd[4226]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:14.351000 audit[4226]: USER_END pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:14.368000 kernel: audit: type=1106 audit(1712948114.351:1293): pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:14.351000 audit[4226]: CRED_DISP pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:14.370501 systemd[1]: sshd@14-172.24.4.50:22-172.24.4.1:52358.service: Deactivated successfully. Apr 12 18:55:14.385094 kernel: audit: type=1104 audit(1712948114.351:1294): pid=4226 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:14.373177 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:55:14.379458 systemd-logind[1049]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:55:14.383111 systemd-logind[1049]: Removed session 15. Apr 12 18:55:14.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.50:22-172.24.4.1:52358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:14.401225 kernel: audit: type=1131 audit(1712948114.370:1295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.50:22-172.24.4.1:52358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:15.757000 audit[4238]: USER_ACCT pid=4238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.766819 sshd[4238]: Accepted publickey for core from 172.24.4.1 port 52372 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:15.767373 kernel: audit: type=1101 audit(1712948115.757:1296): pid=4238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.775992 kernel: audit: type=1103 audit(1712948115.766:1297): pid=4238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.766000 audit[4238]: CRED_ACQ pid=4238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.782050 kernel: audit: type=1006 audit(1712948115.767:1298): pid=4238 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:55:15.767000 audit[4238]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc65715c80 a2=3 a3=0 items=0 ppid=1 pid=4238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:15.827719 kernel: audit: type=1300 audit(1712948115.767:1298): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc65715c80 a2=3 a3=0 items=0 ppid=1 pid=4238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:15.827796 kernel: audit: type=1327 audit(1712948115.767:1298): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:15.767000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:15.847795 sshd[4238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:15.908501 systemd-logind[1049]: New session 16 of user core. Apr 12 18:55:15.909017 systemd[1]: Started session-16.scope. Apr 12 18:55:15.922000 audit[4238]: USER_START pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.934983 kernel: audit: type=1105 audit(1712948115.922:1299): pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:15.933000 audit[4246]: CRED_ACQ pid=4246 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:18.756000 audit[4257]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:18.756000 audit[4257]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc4fb48e10 a2=0 a3=7ffc4fb48dfc items=0 ppid=2079 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:18.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:18.766000 audit[4257]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:18.766000 audit[4257]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4fb48e10 a2=0 a3=0 items=0 ppid=2079 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:18.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:18.795000 audit[4259]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:18.795000 audit[4259]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe35065230 a2=0 a3=7ffe3506521c items=0 ppid=2079 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:18.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:18.798000 audit[4259]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:18.798000 audit[4259]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe35065230 a2=0 a3=0 items=0 ppid=2079 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:18.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:18.884606 kubelet[1941]: I0412 18:55:18.884542 1941 topology_manager.go:215] "Topology Admit Handler" podUID="749696bc-53a0-4032-aeb5-13fa6a61b464" podNamespace="calico-apiserver" podName="calico-apiserver-56b8cd6ddc-phnzd" Apr 12 18:55:18.896385 systemd[1]: Created slice kubepods-besteffort-pod749696bc_53a0_4032_aeb5_13fa6a61b464.slice. Apr 12 18:55:18.925800 sshd[4238]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:18.930000 audit[4238]: USER_END pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:18.931000 audit[4238]: CRED_DISP pid=4238 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:18.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.50:22-172.24.4.1:55520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:18.932603 systemd[1]: Started sshd@16-172.24.4.50:22-172.24.4.1:55520.service. Apr 12 18:55:18.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.50:22-172.24.4.1:52372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:18.946456 systemd[1]: sshd@15-172.24.4.50:22-172.24.4.1:52372.service: Deactivated successfully. Apr 12 18:55:18.947375 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:55:18.948734 systemd-logind[1049]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:55:18.951501 systemd-logind[1049]: Removed session 16. Apr 12 18:55:19.025284 kubelet[1941]: I0412 18:55:19.025165 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ns95m\" (UniqueName: \"kubernetes.io/projected/749696bc-53a0-4032-aeb5-13fa6a61b464-kube-api-access-ns95m\") pod \"calico-apiserver-56b8cd6ddc-phnzd\" (UID: \"749696bc-53a0-4032-aeb5-13fa6a61b464\") " pod="calico-apiserver/calico-apiserver-56b8cd6ddc-phnzd" Apr 12 18:55:19.025284 kubelet[1941]: I0412 18:55:19.025247 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/749696bc-53a0-4032-aeb5-13fa6a61b464-calico-apiserver-certs\") pod \"calico-apiserver-56b8cd6ddc-phnzd\" (UID: \"749696bc-53a0-4032-aeb5-13fa6a61b464\") " pod="calico-apiserver/calico-apiserver-56b8cd6ddc-phnzd" Apr 12 18:55:19.152183 kubelet[1941]: E0412 18:55:19.152108 1941 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:55:19.163115 kubelet[1941]: E0412 18:55:19.163073 1941 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/749696bc-53a0-4032-aeb5-13fa6a61b464-calico-apiserver-certs podName:749696bc-53a0-4032-aeb5-13fa6a61b464 nodeName:}" failed. No retries permitted until 2024-04-12 18:55:19.652246756 +0000 UTC m=+110.669142598 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/749696bc-53a0-4032-aeb5-13fa6a61b464-calico-apiserver-certs") pod "calico-apiserver-56b8cd6ddc-phnzd" (UID: "749696bc-53a0-4032-aeb5-13fa6a61b464") : secret "calico-apiserver-certs" not found Apr 12 18:55:19.804244 env[1067]: time="2024-04-12T18:55:19.804175352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-56b8cd6ddc-phnzd,Uid:749696bc-53a0-4032-aeb5-13fa6a61b464,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:55:19.851971 kernel: kauditd_printk_skb: 17 callbacks suppressed Apr 12 18:55:19.852297 kernel: audit: type=1325 audit(1712948119.849:1309): table=filter:117 family=2 entries=33 op=nft_register_rule pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:19.849000 audit[4276]: NETFILTER_CFG table=filter:117 family=2 entries=33 op=nft_register_rule pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:19.849000 audit[4276]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff665f35c0 a2=0 a3=7fff665f35ac items=0 ppid=2079 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:19.860624 kernel: audit: type=1300 audit(1712948119.849:1309): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff665f35c0 a2=0 a3=7fff665f35ac items=0 ppid=2079 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:19.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:19.860000 audit[4276]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:19.867288 kernel: audit: type=1327 audit(1712948119.849:1309): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:19.867385 kernel: audit: type=1325 audit(1712948119.860:1310): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:19.860000 audit[4276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff665f35c0 a2=0 a3=0 items=0 ppid=2079 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:19.873118 kernel: audit: type=1300 audit(1712948119.860:1310): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff665f35c0 a2=0 a3=0 items=0 ppid=2079 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:19.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:19.876333 kernel: audit: type=1327 audit(1712948119.860:1310): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:20.157383 systemd-networkd[978]: calicbc2f5f5cc5: Link UP Apr 12 18:55:20.164813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:55:20.165241 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicbc2f5f5cc5: link becomes ready Apr 12 18:55:20.164336 systemd-networkd[978]: calicbc2f5f5cc5: Gained carrier Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.026 [INFO][4266] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0 calico-apiserver-56b8cd6ddc- calico-apiserver 749696bc-53a0-4032-aeb5-13fa6a61b464 1072 0 2024-04-12 18:55:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:56b8cd6ddc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-d-76b1f6eb3d.novalocal calico-apiserver-56b8cd6ddc-phnzd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicbc2f5f5cc5 [] []}} ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.027 [INFO][4266] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.077 [INFO][4279] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" HandleID="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.089 [INFO][4279] ipam_plugin.go 268: Auto assigning IP ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" HandleID="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec8a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-d-76b1f6eb3d.novalocal", "pod":"calico-apiserver-56b8cd6ddc-phnzd", "timestamp":"2024-04-12 18:55:20.077406276 +0000 UTC"}, Hostname:"ci-3510-3-3-d-76b1f6eb3d.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.089 [INFO][4279] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.089 [INFO][4279] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.089 [INFO][4279] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d-76b1f6eb3d.novalocal' Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.092 [INFO][4279] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.097 [INFO][4279] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.102 [INFO][4279] ipam.go 489: Trying affinity for 192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.105 [INFO][4279] ipam.go 155: Attempting to load block cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.116 [INFO][4279] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.128/26 host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.117 [INFO][4279] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.128/26 handle="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.119 [INFO][4279] ipam.go 1682: Creating new handle: k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.124 [INFO][4279] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.128/26 handle="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.133 [INFO][4279] ipam.go 1216: Successfully claimed IPs: [192.168.125.133/26] block=192.168.125.128/26 handle="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.133 [INFO][4279] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.133/26] handle="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" host="ci-3510-3-3-d-76b1f6eb3d.novalocal" Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.133 [INFO][4279] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:55:20.191961 env[1067]: 2024-04-12 18:55:20.133 [INFO][4279] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.133/26] IPv6=[] ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" HandleID="k8s-pod-network.0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Workload="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.139 [INFO][4266] k8s.go 385: Populated endpoint ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0", GenerateName:"calico-apiserver-56b8cd6ddc-", Namespace:"calico-apiserver", SelfLink:"", UID:"749696bc-53a0-4032-aeb5-13fa6a61b464", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"56b8cd6ddc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"", Pod:"calico-apiserver-56b8cd6ddc-phnzd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbc2f5f5cc5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.139 [INFO][4266] k8s.go 386: Calico CNI using IPs: [192.168.125.133/32] ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.139 [INFO][4266] dataplane_linux.go 68: Setting the host side veth name to calicbc2f5f5cc5 ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.168 [INFO][4266] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.169 [INFO][4266] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0", GenerateName:"calico-apiserver-56b8cd6ddc-", Namespace:"calico-apiserver", SelfLink:"", UID:"749696bc-53a0-4032-aeb5-13fa6a61b464", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"56b8cd6ddc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d-76b1f6eb3d.novalocal", ContainerID:"0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec", Pod:"calico-apiserver-56b8cd6ddc-phnzd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbc2f5f5cc5", MAC:"b6:ed:d9:05:e2:9d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:20.211334 env[1067]: 2024-04-12 18:55:20.188 [INFO][4266] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec" Namespace="calico-apiserver" Pod="calico-apiserver-56b8cd6ddc-phnzd" WorkloadEndpoint="ci--3510--3--3--d--76b1f6eb3d.novalocal-k8s-calico--apiserver--56b8cd6ddc--phnzd-eth0" Apr 12 18:55:20.232000 audit[4298]: NETFILTER_CFG table=filter:119 family=2 entries=59 op=nft_register_chain pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:55:20.232000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=30140 a0=3 a1=7ffc65395d20 a2=0 a3=7ffc65395d0c items=0 ppid=2969 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.247581 kernel: audit: type=1325 audit(1712948120.232:1311): table=filter:119 family=2 entries=59 op=nft_register_chain pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:55:20.247684 kernel: audit: type=1300 audit(1712948120.232:1311): arch=c000003e syscall=46 success=yes exit=30140 a0=3 a1=7ffc65395d20 a2=0 a3=7ffc65395d0c items=0 ppid=2969 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.232000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:55:20.251941 kernel: audit: type=1327 audit(1712948120.232:1311): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:55:20.441489 env[1067]: time="2024-04-12T18:55:20.438974436Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:55:20.441489 env[1067]: time="2024-04-12T18:55:20.439094780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:55:20.441489 env[1067]: time="2024-04-12T18:55:20.439129195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:55:20.441861 env[1067]: time="2024-04-12T18:55:20.441785614Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec pid=4311 runtime=io.containerd.runc.v2 Apr 12 18:55:20.461000 audit[4261]: USER_ACCT pid=4261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:20.472334 kernel: audit: type=1101 audit(1712948120.461:1312): pid=4261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:20.472421 sshd[4261]: Accepted publickey for core from 172.24.4.1 port 55520 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:20.476000 audit[4261]: CRED_ACQ pid=4261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:20.476000 audit[4261]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7c102c20 a2=3 a3=0 items=0 ppid=1 pid=4261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.483526 systemd[1]: run-containerd-runc-k8s.io-0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec-runc.lvKCa9.mount: Deactivated successfully. Apr 12 18:55:20.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:20.488230 systemd[1]: Started cri-containerd-0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec.scope. Apr 12 18:55:20.508646 sshd[4261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.516000 audit: BPF prog-id=186 op=LOAD Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4311 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323263643166643864643665626562613838396162343738373936 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4311 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323263643166643864643665626562613838396162343738373936 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.517000 audit: BPF prog-id=187 op=LOAD Apr 12 18:55:20.517000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000a8660 items=0 ppid=4311 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323263643166643864643665626562613838396162343738373936 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.518000 audit: BPF prog-id=188 op=LOAD Apr 12 18:55:20.518000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000a86a8 items=0 ppid=4311 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323263643166643864643665626562613838396162343738373936 Apr 12 18:55:20.519000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:55:20.519000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:20.520000 audit: BPF prog-id=189 op=LOAD Apr 12 18:55:20.520000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000a8ab8 items=0 ppid=4311 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:20.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323263643166643864643665626562613838396162343738373936 Apr 12 18:55:20.534000 audit[4261]: USER_START pid=4261 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:20.555000 audit[4337]: CRED_ACQ pid=4337 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:20.527394 systemd[1]: Started session-17.scope. Apr 12 18:55:20.685864 env[1067]: time="2024-04-12T18:55:20.571147674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-56b8cd6ddc-phnzd,Uid:749696bc-53a0-4032-aeb5-13fa6a61b464,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec\"" Apr 12 18:55:20.685864 env[1067]: time="2024-04-12T18:55:20.575033353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:55:20.528825 systemd-logind[1049]: New session 17 of user core. Apr 12 18:55:21.726032 update_engine[1050]: I0412 18:55:21.725981 1050 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:55:21.726407 update_engine[1050]: I0412 18:55:21.726248 1050 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:55:21.726407 update_engine[1050]: E0412 18:55:21.726361 1050 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:55:21.726530 update_engine[1050]: I0412 18:55:21.726435 1050 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 18:55:21.740035 systemd-networkd[978]: calicbc2f5f5cc5: Gained IPv6LL Apr 12 18:55:22.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.50:22-172.24.4.1:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:22.778650 systemd[1]: Started sshd@17-172.24.4.50:22-172.24.4.1:55528.service. Apr 12 18:55:22.820545 sshd[4261]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:22.822000 audit[4261]: USER_END pid=4261 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:22.822000 audit[4261]: CRED_DISP pid=4261 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:22.825151 systemd[1]: sshd@16-172.24.4.50:22-172.24.4.1:55520.service: Deactivated successfully. Apr 12 18:55:22.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.50:22-172.24.4.1:55520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:22.827203 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:55:22.832709 systemd-logind[1049]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:55:22.838531 systemd-logind[1049]: Removed session 17. Apr 12 18:55:22.945772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4211895726.mount: Deactivated successfully. Apr 12 18:55:24.297000 audit[4351]: USER_ACCT pid=4351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:24.300796 sshd[4351]: Accepted publickey for core from 172.24.4.1 port 55528 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:24.302000 audit[4351]: CRED_ACQ pid=4351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:24.303000 audit[4351]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe37f04da0 a2=3 a3=0 items=0 ppid=1 pid=4351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:24.303000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:24.308518 sshd[4351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:24.328181 systemd[1]: Started session-18.scope. Apr 12 18:55:24.332193 systemd-logind[1049]: New session 18 of user core. Apr 12 18:55:24.352000 audit[4351]: USER_START pid=4351 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:24.355000 audit[4355]: CRED_ACQ pid=4355 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:24.598000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.598000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d02d20 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:24.598000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:24.598000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.598000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c41f50 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:24.598000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:24.938542 kernel: kauditd_printk_skb: 80 callbacks suppressed Apr 12 18:55:24.938665 kernel: audit: type=1400 audit(1712948124.927:1346): avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.927000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.927000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ec7d500 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.950694 kernel: audit: type=1300 audit(1712948124.927:1346): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ec7d500 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.950777 kernel: audit: type=1327 audit(1712948124.927:1346): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.927000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.955503 kernel: audit: type=1400 audit(1712948124.928:1347): avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.928000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526924 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.968882 kernel: audit: type=1300 audit(1712948124.928:1347): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ec7d530 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.968978 kernel: audit: type=1327 audit(1712948124.928:1347): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.928000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ec7d530 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.974978 kernel: audit: type=1400 audit(1712948124.928:1348): avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.928000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.928000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00f9b1680 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.982968 kernel: audit: type=1300 audit(1712948124.928:1348): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00f9b1680 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.988954 kernel: audit: type=1327 audit(1712948124.928:1348): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.928000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.994956 kernel: audit: type=1400 audit(1712948124.928:1349): avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.928000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0062edf20 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.968000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.968000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0100e6030 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.968000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:24.968000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:24.968000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c007db0460 a2=fc6 a3=0 items=0 ppid=1643 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c904 key=(null) Apr 12 18:55:24.968000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3530002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:55:25.455162 env[1067]: time="2024-04-12T18:55:25.455076761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:25.460575 env[1067]: time="2024-04-12T18:55:25.460520447Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:25.463099 env[1067]: time="2024-04-12T18:55:25.463067854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:25.465632 env[1067]: time="2024-04-12T18:55:25.465593109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:25.466336 env[1067]: time="2024-04-12T18:55:25.466294090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:55:25.473972 env[1067]: time="2024-04-12T18:55:25.473897847Z" level=info msg="CreateContainer within sandbox \"0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:55:25.495126 env[1067]: time="2024-04-12T18:55:25.495061598Z" level=info msg="CreateContainer within sandbox \"0f22cd1fd8dd6ebeba889ab4787968a3f8dd70dcf949ee23d1a4e254d7f7c4ec\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296\"" Apr 12 18:55:25.495782 env[1067]: time="2024-04-12T18:55:25.495739326Z" level=info msg="StartContainer for \"8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296\"" Apr 12 18:55:25.532672 systemd[1]: run-containerd-runc-k8s.io-8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296-runc.HMZNAK.mount: Deactivated successfully. Apr 12 18:55:25.541633 systemd[1]: Started cri-containerd-8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296.scope. Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.559000 audit: BPF prog-id=190 op=LOAD Apr 12 18:55:25.560000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.560000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4311 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:25.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862396532323533663363633162376262633962363933336331633232 Apr 12 18:55:25.560000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.560000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4311 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:25.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862396532323533663363633162376262633962363933336331633232 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit: BPF prog-id=191 op=LOAD Apr 12 18:55:25.561000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003788e0 items=0 ppid=4311 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:25.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862396532323533663363633162376262633962363933336331633232 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit: BPF prog-id=192 op=LOAD Apr 12 18:55:25.561000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000378928 items=0 ppid=4311 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:25.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862396532323533663363633162376262633962363933336331633232 Apr 12 18:55:25.561000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:55:25.561000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:25.561000 audit: BPF prog-id=193 op=LOAD Apr 12 18:55:25.561000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000378d38 items=0 ppid=4311 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:25.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862396532323533663363633162376262633962363933336331633232 Apr 12 18:55:25.670703 sshd[4351]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:25.674000 audit[4351]: USER_END pid=4351 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:25.674000 audit[4351]: CRED_DISP pid=4351 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:25.678939 env[1067]: time="2024-04-12T18:55:25.677885313Z" level=info msg="StartContainer for \"8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296\" returns successfully" Apr 12 18:55:25.691078 systemd[1]: sshd@17-172.24.4.50:22-172.24.4.1:55528.service: Deactivated successfully. Apr 12 18:55:25.691946 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:55:25.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.50:22-172.24.4.1:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:25.693540 systemd-logind[1049]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:55:25.694675 systemd-logind[1049]: Removed session 18. Apr 12 18:55:26.728000 audit[4388]: AVC avc: denied { watch } for pid=4388 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_55_19.1033808353/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c261,c887 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c261,c887 tclass=file permissive=0 Apr 12 18:55:26.728000 audit[4388]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c21480 a2=fc6 a3=0 items=0 ppid=4311 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c261,c887 key=(null) Apr 12 18:55:26.728000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:55:26.838000 audit[4411]: NETFILTER_CFG table=filter:120 family=2 entries=34 op=nft_register_rule pid=4411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:26.838000 audit[4411]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff1c409f20 a2=0 a3=7fff1c409f0c items=0 ppid=2079 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:26.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:26.840000 audit[4411]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:26.840000 audit[4411]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff1c409f20 a2=0 a3=0 items=0 ppid=2079 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:26.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:27.705627 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.QScSHE.mount: Deactivated successfully. Apr 12 18:55:28.983000 audit[4432]: NETFILTER_CFG table=filter:122 family=2 entries=22 op=nft_register_rule pid=4432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:28.983000 audit[4432]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd7d5450b0 a2=0 a3=7ffd7d54509c items=0 ppid=2079 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:28.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:28.991000 audit[4432]: NETFILTER_CFG table=nat:123 family=2 entries=104 op=nft_register_chain pid=4432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:28.991000 audit[4432]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd7d5450b0 a2=0 a3=7ffd7d54509c items=0 ppid=2079 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:28.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:29.499000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:29.499000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024e9740 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:29.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:29.500000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:29.500000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024aaca0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:29.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:29.516000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:29.516000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024e97c0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:29.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:29.516000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:55:29.516000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024e97e0 a2=fc6 a3=0 items=0 ppid=1659 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c951 key=(null) Apr 12 18:55:29.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:55:30.680748 systemd[1]: Started sshd@18-172.24.4.50:22-172.24.4.1:47666.service. Apr 12 18:55:30.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.50:22-172.24.4.1:47666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:30.698600 kernel: kauditd_printk_skb: 95 callbacks suppressed Apr 12 18:55:30.698752 kernel: audit: type=1130 audit(1712948130.681:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.50:22-172.24.4.1:47666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:31.731671 update_engine[1050]: I0412 18:55:31.731585 1050 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:55:31.732305 update_engine[1050]: I0412 18:55:31.732090 1050 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:55:31.732375 update_engine[1050]: E0412 18:55:31.732309 1050 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:55:31.732550 update_engine[1050]: I0412 18:55:31.732422 1050 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:55:31.737886 update_engine[1050]: I0412 18:55:31.732434 1050 omaha_request_action.cc:621] Omaha request response: Apr 12 18:55:31.747908 update_engine[1050]: E0412 18:55:31.747814 1050 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748005 1050 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748025 1050 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748036 1050 update_attempter.cc:306] Processing Done. Apr 12 18:55:31.748159 update_engine[1050]: E0412 18:55:31.748060 1050 update_attempter.cc:619] Update failed. Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748070 1050 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748080 1050 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 18:55:31.748159 update_engine[1050]: I0412 18:55:31.748090 1050 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.748279 1050 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.748576 1050 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.748594 1050 omaha_request_action.cc:271] Request: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.748606 1050 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749022 1050 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:55:31.749490 update_engine[1050]: E0412 18:55:31.749217 1050 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749383 1050 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749403 1050 omaha_request_action.cc:621] Omaha request response: Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749415 1050 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749425 1050 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749434 1050 update_attempter.cc:306] Processing Done. Apr 12 18:55:31.749490 update_engine[1050]: I0412 18:55:31.749442 1050 update_attempter.cc:310] Error event sent. Apr 12 18:55:31.765175 update_engine[1050]: I0412 18:55:31.757098 1050 update_check_scheduler.cc:74] Next update check in 47m30s Apr 12 18:55:31.798073 locksmithd[1099]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 18:55:31.799022 locksmithd[1099]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 18:55:32.210000 audit[4441]: USER_ACCT pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.224526 sshd[4441]: Accepted publickey for core from 172.24.4.1 port 47666 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:32.225246 kernel: audit: type=1101 audit(1712948132.210:1383): pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.237875 kernel: audit: type=1103 audit(1712948132.223:1384): pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.223000 audit[4441]: CRED_ACQ pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.228050 sshd[4441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:32.223000 audit[4441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd04b05b40 a2=3 a3=0 items=0 ppid=1 pid=4441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:32.260410 kernel: audit: type=1006 audit(1712948132.223:1385): pid=4441 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 18:55:32.260627 kernel: audit: type=1300 audit(1712948132.223:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd04b05b40 a2=3 a3=0 items=0 ppid=1 pid=4441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:32.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:32.280560 kernel: audit: type=1327 audit(1712948132.223:1385): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:32.288727 systemd-logind[1049]: New session 19 of user core. Apr 12 18:55:32.292639 systemd[1]: Started session-19.scope. Apr 12 18:55:32.306000 audit[4441]: USER_START pid=4441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.308000 audit[4443]: CRED_ACQ pid=4443 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.319505 kernel: audit: type=1105 audit(1712948132.306:1386): pid=4441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.319629 kernel: audit: type=1103 audit(1712948132.308:1387): pid=4443 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:32.967000 audit[4452]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:32.967000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2cc202f0 a2=0 a3=7ffc2cc202dc items=0 ppid=2079 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:32.977683 kernel: audit: type=1325 audit(1712948132.967:1388): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:32.977771 kernel: audit: type=1300 audit(1712948132.967:1388): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2cc202f0 a2=0 a3=7ffc2cc202dc items=0 ppid=2079 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:32.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:32.969000 audit[4452]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:32.969000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc2cc202f0 a2=0 a3=7ffc2cc202dc items=0 ppid=2079 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:32.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:33.200938 sshd[4441]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:33.201000 audit[4441]: USER_END pid=4441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:33.201000 audit[4441]: CRED_DISP pid=4441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:33.204178 systemd[1]: sshd@18-172.24.4.50:22-172.24.4.1:47666.service: Deactivated successfully. Apr 12 18:55:33.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.50:22-172.24.4.1:47666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:33.205315 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:55:33.206022 systemd-logind[1049]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:55:33.208751 systemd-logind[1049]: Removed session 19. Apr 12 18:55:37.782220 systemd[1]: run-containerd-runc-k8s.io-ff3b0b15c7e9c0f7d6b92788e38fac3fba4731e7fcc7b5d6c1da6c92d61173ca-runc.C1KTW3.mount: Deactivated successfully. Apr 12 18:55:38.218009 systemd[1]: Started sshd@19-172.24.4.50:22-172.24.4.1:34690.service. Apr 12 18:55:38.236877 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:55:38.238286 kernel: audit: type=1130 audit(1712948138.218:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.50:22-172.24.4.1:34690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:38.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.50:22-172.24.4.1:34690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:39.347000 audit[4480]: USER_ACCT pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.360092 kernel: audit: type=1101 audit(1712948139.347:1394): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.360357 sshd[4480]: Accepted publickey for core from 172.24.4.1 port 34690 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:39.361000 audit[4480]: CRED_ACQ pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.363691 sshd[4480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:39.374700 kernel: audit: type=1103 audit(1712948139.361:1395): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.374825 kernel: audit: type=1006 audit(1712948139.361:1396): pid=4480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:55:39.361000 audit[4480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2dcc640 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:39.391183 kernel: audit: type=1300 audit(1712948139.361:1396): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2dcc640 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:39.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:39.396059 kernel: audit: type=1327 audit(1712948139.361:1396): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:39.401042 systemd-logind[1049]: New session 20 of user core. Apr 12 18:55:39.403885 systemd[1]: Started session-20.scope. Apr 12 18:55:39.419000 audit[4480]: USER_START pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.436509 kernel: audit: type=1105 audit(1712948139.419:1397): pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.436744 kernel: audit: type=1103 audit(1712948139.434:1398): pid=4500 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:39.434000 audit[4500]: CRED_ACQ pid=4500 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:40.168368 sshd[4480]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:40.170000 audit[4480]: USER_END pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:40.186965 kernel: audit: type=1106 audit(1712948140.170:1399): pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:40.187473 systemd[1]: sshd@19-172.24.4.50:22-172.24.4.1:34690.service: Deactivated successfully. Apr 12 18:55:40.170000 audit[4480]: CRED_DISP pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:40.189597 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:55:40.192474 systemd-logind[1049]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:55:40.194798 systemd-logind[1049]: Removed session 20. Apr 12 18:55:40.201161 kernel: audit: type=1104 audit(1712948140.170:1400): pid=4480 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:40.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.50:22-172.24.4.1:34690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:45.184664 systemd[1]: Started sshd@20-172.24.4.50:22-172.24.4.1:36186.service. Apr 12 18:55:45.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.50:22-172.24.4.1:36186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:45.192565 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:45.192777 kernel: audit: type=1130 audit(1712948145.185:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.50:22-172.24.4.1:36186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:46.298000 audit[4520]: USER_ACCT pid=4520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.299508 sshd[4520]: Accepted publickey for core from 172.24.4.1 port 36186 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:46.309954 kernel: audit: type=1101 audit(1712948146.298:1403): pid=4520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.309000 audit[4520]: CRED_ACQ pid=4520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.310613 sshd[4520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:46.319981 kernel: audit: type=1103 audit(1712948146.309:1404): pid=4520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.325833 systemd[1]: Started session-21.scope. Apr 12 18:55:46.309000 audit[4520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53206980 a2=3 a3=0 items=0 ppid=1 pid=4520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:46.327875 systemd-logind[1049]: New session 21 of user core. Apr 12 18:55:46.337143 kernel: audit: type=1006 audit(1712948146.309:1405): pid=4520 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:55:46.337262 kernel: audit: type=1300 audit(1712948146.309:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53206980 a2=3 a3=0 items=0 ppid=1 pid=4520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:46.337297 kernel: audit: type=1327 audit(1712948146.309:1405): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:46.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:46.333000 audit[4520]: USER_START pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.352389 kernel: audit: type=1105 audit(1712948146.333:1406): pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.352474 kernel: audit: type=1103 audit(1712948146.335:1407): pid=4527 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:46.335000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:47.105737 sshd[4520]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:47.107000 audit[4520]: USER_END pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:47.111421 systemd[1]: sshd@20-172.24.4.50:22-172.24.4.1:36186.service: Deactivated successfully. Apr 12 18:55:47.113100 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:55:47.121117 kernel: audit: type=1106 audit(1712948147.107:1408): pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:47.107000 audit[4520]: CRED_DISP pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:47.133071 kernel: audit: type=1104 audit(1712948147.107:1409): pid=4520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:47.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.50:22-172.24.4.1:36186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:47.133480 systemd-logind[1049]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:55:47.135785 systemd-logind[1049]: Removed session 21. Apr 12 18:55:49.877182 systemd[1]: run-containerd-runc-k8s.io-8b9e2253f3cc1b7bbc9b6933c1c22aa5e14c7ab14eae71b05032b84e27ed5296-runc.8N6cuJ.mount: Deactivated successfully. Apr 12 18:55:49.969857 kubelet[1941]: I0412 18:55:49.968545 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-56b8cd6ddc-phnzd" podStartSLOduration=27.058064584 podStartE2EDuration="31.950901939s" podCreationTimestamp="2024-04-12 18:55:18 +0000 UTC" firstStartedPulling="2024-04-12 18:55:20.574436768 +0000 UTC m=+111.591332610" lastFinishedPulling="2024-04-12 18:55:25.467274113 +0000 UTC m=+116.484169965" observedRunningTime="2024-04-12 18:55:26.709431027 +0000 UTC m=+117.726327010" watchObservedRunningTime="2024-04-12 18:55:49.950901939 +0000 UTC m=+140.967797792" Apr 12 18:55:49.986000 audit[4557]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:49.986000 audit[4557]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc2154f280 a2=0 a3=7ffc2154f26c items=0 ppid=2079 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:49.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:49.991000 audit[4557]: NETFILTER_CFG table=nat:127 family=2 entries=51 op=nft_register_chain pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:49.991000 audit[4557]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffc2154f280 a2=0 a3=7ffc2154f26c items=0 ppid=2079 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:49.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:50.006000 audit[4559]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:50.006000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc6eb509f0 a2=0 a3=7ffc6eb509dc items=0 ppid=2079 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:50.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:50.010000 audit[4559]: NETFILTER_CFG table=nat:129 family=2 entries=58 op=nft_register_chain pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:50.010000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc6eb509f0 a2=0 a3=7ffc6eb509dc items=0 ppid=2079 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:50.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:52.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.50:22-172.24.4.1:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:52.119332 systemd[1]: Started sshd@21-172.24.4.50:22-172.24.4.1:36194.service. Apr 12 18:55:52.123114 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:55:52.125066 kernel: audit: type=1130 audit(1712948152.118:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.50:22-172.24.4.1:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:53.475351 sshd[4561]: Accepted publickey for core from 172.24.4.1 port 36194 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:55:53.474000 audit[4561]: USER_ACCT pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.479972 kernel: audit: type=1101 audit(1712948153.474:1416): pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.485449 kernel: audit: type=1103 audit(1712948153.479:1417): pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.479000 audit[4561]: CRED_ACQ pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.486400 sshd[4561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:53.493484 kernel: audit: type=1006 audit(1712948153.479:1418): pid=4561 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:55:53.479000 audit[4561]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc898743b0 a2=3 a3=0 items=0 ppid=1 pid=4561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:53.499822 kernel: audit: type=1300 audit(1712948153.479:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc898743b0 a2=3 a3=0 items=0 ppid=1 pid=4561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:53.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:53.503213 kernel: audit: type=1327 audit(1712948153.479:1418): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:53.507753 systemd[1]: Started session-22.scope. Apr 12 18:55:53.508466 systemd-logind[1049]: New session 22 of user core. Apr 12 18:55:53.516000 audit[4561]: USER_START pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.525000 audit[4563]: CRED_ACQ pid=4563 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.531153 kernel: audit: type=1105 audit(1712948153.516:1419): pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:53.531210 kernel: audit: type=1103 audit(1712948153.525:1420): pid=4563 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:54.366862 sshd[4561]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:54.368000 audit[4561]: USER_END pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:54.385988 kernel: audit: type=1106 audit(1712948154.368:1421): pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:54.386171 kernel: audit: type=1104 audit(1712948154.368:1422): pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:54.368000 audit[4561]: CRED_DISP pid=4561 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:55:54.382794 systemd[1]: sshd@21-172.24.4.50:22-172.24.4.1:36194.service: Deactivated successfully. Apr 12 18:55:54.384436 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:55:54.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.50:22-172.24.4.1:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:54.393895 systemd-logind[1049]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:55:54.395888 systemd-logind[1049]: Removed session 22. Apr 12 18:55:57.683299 systemd[1]: run-containerd-runc-k8s.io-807e2f8a0340fce4a05edd27106dc43e5dc3e0ecb16cd837885d4392b4491e9c-runc.ds47cp.mount: Deactivated successfully. Apr 12 18:55:59.382628 systemd[1]: Started sshd@22-172.24.4.50:22-172.24.4.1:41282.service. Apr 12 18:55:59.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.50:22-172.24.4.1:41282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:59.391276 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:55:59.392598 kernel: audit: type=1130 audit(1712948159.383:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.50:22-172.24.4.1:41282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:56:01.171000 audit[4612]: USER_ACCT pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.173240 sshd[4612]: Accepted publickey for core from 172.24.4.1 port 41282 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:56:01.184977 kernel: audit: type=1101 audit(1712948161.171:1425): pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.185000 audit[4612]: CRED_ACQ pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.199204 kernel: audit: type=1103 audit(1712948161.185:1426): pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.199363 kernel: audit: type=1006 audit(1712948161.185:1427): pid=4612 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:56:01.185000 audit[4612]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d5eab50 a2=3 a3=0 items=0 ppid=1 pid=4612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:01.211412 sshd[4612]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:56:01.222668 kernel: audit: type=1300 audit(1712948161.185:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d5eab50 a2=3 a3=0 items=0 ppid=1 pid=4612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:56:01.225409 kernel: audit: type=1327 audit(1712948161.185:1427): proctitle=737368643A20636F7265205B707269765D Apr 12 18:56:01.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:56:01.238226 systemd-logind[1049]: New session 23 of user core. Apr 12 18:56:01.240163 systemd[1]: Started session-23.scope. Apr 12 18:56:01.252000 audit[4612]: USER_START pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.263157 kernel: audit: type=1105 audit(1712948161.252:1428): pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.263305 kernel: audit: type=1103 audit(1712948161.261:1429): pid=4616 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:01.261000 audit[4616]: CRED_ACQ pid=4616 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:02.127323 sshd[4612]: pam_unix(sshd:session): session closed for user core Apr 12 18:56:02.129000 audit[4612]: USER_END pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:02.134042 systemd[1]: sshd@22-172.24.4.50:22-172.24.4.1:41282.service: Deactivated successfully. Apr 12 18:56:02.135604 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:56:02.144973 kernel: audit: type=1106 audit(1712948162.129:1430): pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:02.146002 systemd-logind[1049]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:56:02.129000 audit[4612]: CRED_DISP pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:02.157092 kernel: audit: type=1104 audit(1712948162.129:1431): pid=4612 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:56:02.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.50:22-172.24.4.1:41282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:56:02.157711 systemd-logind[1049]: Removed session 23.