Mar 17 18:42:26.133941 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 18:42:26.133985 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:42:26.134003 kernel: BIOS-provided physical RAM map: Mar 17 18:42:26.134160 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Mar 17 18:42:26.134180 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Mar 17 18:42:26.134194 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Mar 17 18:42:26.134247 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Mar 17 18:42:26.134261 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Mar 17 18:42:26.134273 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable Mar 17 18:42:26.134288 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data Mar 17 18:42:26.134300 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable Mar 17 18:42:26.134313 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Mar 17 18:42:26.134327 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Mar 17 18:42:26.134341 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Mar 17 18:42:26.134369 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Mar 17 18:42:26.134385 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Mar 17 18:42:26.134400 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Mar 17 18:42:26.134429 kernel: NX (Execute Disable) protection: active Mar 17 18:42:26.134445 kernel: efi: EFI v2.70 by EDK II Mar 17 18:42:26.134462 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 Mar 17 18:42:26.134477 kernel: random: crng init done Mar 17 18:42:26.134492 kernel: SMBIOS 2.4 present. Mar 17 18:42:26.134513 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Mar 17 18:42:26.134528 kernel: Hypervisor detected: KVM Mar 17 18:42:26.134543 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 18:42:26.134557 kernel: kvm-clock: cpu 0, msr 16a19a001, primary cpu clock Mar 17 18:42:26.134572 kernel: kvm-clock: using sched offset of 13480834590 cycles Mar 17 18:42:26.134586 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 18:42:26.134601 kernel: tsc: Detected 2299.998 MHz processor Mar 17 18:42:26.134617 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 18:42:26.134633 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 18:42:26.134649 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Mar 17 18:42:26.134669 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 18:42:26.134684 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Mar 17 18:42:26.134701 kernel: Using GB pages for direct mapping Mar 17 18:42:26.134716 kernel: Secure boot disabled Mar 17 18:42:26.134732 kernel: ACPI: Early table checksum verification disabled Mar 17 18:42:26.134747 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Mar 17 18:42:26.134763 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Mar 17 18:42:26.134779 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Mar 17 18:42:26.134805 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Mar 17 18:42:26.134822 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Mar 17 18:42:26.134838 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Mar 17 18:42:26.134855 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Mar 17 18:42:26.134872 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Mar 17 18:42:26.134889 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Mar 17 18:42:26.134909 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Mar 17 18:42:26.134926 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Mar 17 18:42:26.134944 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Mar 17 18:42:26.134960 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Mar 17 18:42:26.134977 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Mar 17 18:42:26.134993 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Mar 17 18:42:26.135010 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Mar 17 18:42:26.135039 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Mar 17 18:42:26.135057 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Mar 17 18:42:26.135078 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Mar 17 18:42:26.135095 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Mar 17 18:42:26.135111 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 18:42:26.135128 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 18:42:26.135145 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Mar 17 18:42:26.135161 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Mar 17 18:42:26.135177 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Mar 17 18:42:26.135195 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Mar 17 18:42:26.135219 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Mar 17 18:42:26.135241 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Mar 17 18:42:26.135258 kernel: Zone ranges: Mar 17 18:42:26.135275 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 18:42:26.135291 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 17 18:42:26.135308 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Mar 17 18:42:26.135325 kernel: Movable zone start for each node Mar 17 18:42:26.135341 kernel: Early memory node ranges Mar 17 18:42:26.135358 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Mar 17 18:42:26.135375 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Mar 17 18:42:26.135396 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] Mar 17 18:42:26.135427 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] Mar 17 18:42:26.135444 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Mar 17 18:42:26.135461 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Mar 17 18:42:26.135477 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Mar 17 18:42:26.135495 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:42:26.135511 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Mar 17 18:42:26.135528 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Mar 17 18:42:26.135545 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Mar 17 18:42:26.135566 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Mar 17 18:42:26.135583 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Mar 17 18:42:26.135600 kernel: ACPI: PM-Timer IO Port: 0xb008 Mar 17 18:42:26.135616 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 18:42:26.135633 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 18:42:26.135650 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 18:42:26.135667 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 18:42:26.135684 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 18:42:26.135700 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 18:42:26.135721 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 18:42:26.135737 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 18:42:26.135754 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Mar 17 18:42:26.135770 kernel: Booting paravirtualized kernel on KVM Mar 17 18:42:26.135787 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 18:42:26.135805 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 18:42:26.135821 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 18:42:26.135837 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 18:42:26.135854 kernel: pcpu-alloc: [0] 0 1 Mar 17 18:42:26.135874 kernel: kvm-guest: PV spinlocks enabled Mar 17 18:42:26.135891 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 18:42:26.135908 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Mar 17 18:42:26.135926 kernel: Policy zone: Normal Mar 17 18:42:26.135945 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:42:26.135961 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:42:26.135978 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 17 18:42:26.135994 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:42:26.136012 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:42:26.136033 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 344872K reserved, 0K cma-reserved) Mar 17 18:42:26.136050 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:42:26.136067 kernel: Kernel/User page tables isolation: enabled Mar 17 18:42:26.136083 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 18:42:26.136100 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 18:42:26.136117 kernel: rcu: Hierarchical RCU implementation. Mar 17 18:42:26.136135 kernel: rcu: RCU event tracing is enabled. Mar 17 18:42:26.136152 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:42:26.136173 kernel: Rude variant of Tasks RCU enabled. Mar 17 18:42:26.136214 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:42:26.136232 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:42:26.136253 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:42:26.136272 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Mar 17 18:42:26.136289 kernel: Console: colour dummy device 80x25 Mar 17 18:42:26.136307 kernel: printk: console [ttyS0] enabled Mar 17 18:42:26.136324 kernel: ACPI: Core revision 20210730 Mar 17 18:42:26.136341 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 18:42:26.136359 kernel: x2apic enabled Mar 17 18:42:26.136381 kernel: Switched APIC routing to physical x2apic. Mar 17 18:42:26.136400 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Mar 17 18:42:26.136471 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Mar 17 18:42:26.136490 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Mar 17 18:42:26.136508 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Mar 17 18:42:26.136526 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Mar 17 18:42:26.136544 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 18:42:26.136567 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Mar 17 18:42:26.136584 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Mar 17 18:42:26.136602 kernel: Spectre V2 : Mitigation: IBRS Mar 17 18:42:26.136620 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 18:42:26.136638 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 18:42:26.136656 kernel: RETBleed: Mitigation: IBRS Mar 17 18:42:26.136674 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 17 18:42:26.136691 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Mar 17 18:42:26.136710 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Mar 17 18:42:26.136732 kernel: MDS: Mitigation: Clear CPU buffers Mar 17 18:42:26.136750 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 18:42:26.136768 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 18:42:26.136786 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 18:42:26.136804 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 18:42:26.136821 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 18:42:26.136840 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Mar 17 18:42:26.136857 kernel: Freeing SMP alternatives memory: 32K Mar 17 18:42:26.136875 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:42:26.136896 kernel: LSM: Security Framework initializing Mar 17 18:42:26.136914 kernel: SELinux: Initializing. Mar 17 18:42:26.136932 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:42:26.136950 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:42:26.136967 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Mar 17 18:42:26.136985 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Mar 17 18:42:26.137003 kernel: signal: max sigframe size: 1776 Mar 17 18:42:26.137021 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:42:26.137039 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 18:42:26.137061 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:42:26.137079 kernel: x86: Booting SMP configuration: Mar 17 18:42:26.137096 kernel: .... node #0, CPUs: #1 Mar 17 18:42:26.137114 kernel: kvm-clock: cpu 1, msr 16a19a041, secondary cpu clock Mar 17 18:42:26.137133 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 17 18:42:26.137152 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 17 18:42:26.137169 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:42:26.137187 kernel: smpboot: Max logical packages: 1 Mar 17 18:42:26.137217 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Mar 17 18:42:26.137235 kernel: devtmpfs: initialized Mar 17 18:42:26.137253 kernel: x86/mm: Memory block size: 128MB Mar 17 18:42:26.137271 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Mar 17 18:42:26.137289 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:42:26.137307 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:42:26.137325 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:42:26.137343 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:42:26.137361 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:42:26.137383 kernel: audit: type=2000 audit(1742236944.443:1): state=initialized audit_enabled=0 res=1 Mar 17 18:42:26.137400 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:42:26.137429 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 18:42:26.137444 kernel: cpuidle: using governor menu Mar 17 18:42:26.137468 kernel: ACPI: bus type PCI registered Mar 17 18:42:26.137486 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:42:26.137503 kernel: dca service started, version 1.12.1 Mar 17 18:42:26.137521 kernel: PCI: Using configuration type 1 for base access Mar 17 18:42:26.137539 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 18:42:26.137561 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:42:26.137579 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:42:26.137597 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:42:26.137615 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:42:26.137633 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:42:26.137652 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:42:26.137668 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:42:26.137686 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:42:26.137704 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:42:26.137726 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Mar 17 18:42:26.137743 kernel: ACPI: Interpreter enabled Mar 17 18:42:26.137761 kernel: ACPI: PM: (supports S0 S3 S5) Mar 17 18:42:26.137779 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 18:42:26.137796 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 18:42:26.137815 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Mar 17 18:42:26.137833 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 18:42:26.138086 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Mar 17 18:42:26.138278 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Mar 17 18:42:26.138302 kernel: PCI host bridge to bus 0000:00 Mar 17 18:42:26.138505 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 18:42:26.138664 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 18:42:26.138813 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 18:42:26.138960 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Mar 17 18:42:26.139239 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 18:42:26.139494 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Mar 17 18:42:26.139681 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Mar 17 18:42:26.139873 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Mar 17 18:42:26.140048 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Mar 17 18:42:26.140227 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Mar 17 18:42:26.140429 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Mar 17 18:42:26.140623 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Mar 17 18:42:26.140811 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Mar 17 18:42:26.141023 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Mar 17 18:42:26.141197 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Mar 17 18:42:26.141388 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Mar 17 18:42:26.147778 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Mar 17 18:42:26.147962 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Mar 17 18:42:26.147993 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 18:42:26.148012 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 18:42:26.148030 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 18:42:26.148048 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 18:42:26.148067 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 17 18:42:26.148084 kernel: iommu: Default domain type: Translated Mar 17 18:42:26.148102 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 18:42:26.148120 kernel: vgaarb: loaded Mar 17 18:42:26.148138 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:42:26.148160 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:42:26.148178 kernel: PTP clock support registered Mar 17 18:42:26.148195 kernel: Registered efivars operations Mar 17 18:42:26.148213 kernel: PCI: Using ACPI for IRQ routing Mar 17 18:42:26.148231 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 18:42:26.148258 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Mar 17 18:42:26.148276 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Mar 17 18:42:26.148294 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] Mar 17 18:42:26.148311 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Mar 17 18:42:26.148333 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Mar 17 18:42:26.148350 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 18:42:26.148367 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:42:26.148385 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:42:26.148416 kernel: pnp: PnP ACPI init Mar 17 18:42:26.148434 kernel: pnp: PnP ACPI: found 7 devices Mar 17 18:42:26.148452 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 18:42:26.148470 kernel: NET: Registered PF_INET protocol family Mar 17 18:42:26.148487 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 18:42:26.148510 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 17 18:42:26.148527 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:42:26.148546 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:42:26.148564 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 17 18:42:26.148582 kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 17 18:42:26.148600 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:42:26.148618 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:42:26.148641 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:42:26.148662 kernel: NET: Registered PF_XDP protocol family Mar 17 18:42:26.148844 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 18:42:26.148999 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 18:42:26.149150 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 18:42:26.149304 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Mar 17 18:42:26.149491 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 17 18:42:26.149517 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:42:26.149541 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 18:42:26.149559 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Mar 17 18:42:26.149577 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 18:42:26.149595 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Mar 17 18:42:26.149613 kernel: clocksource: Switched to clocksource tsc Mar 17 18:42:26.149631 kernel: Initialise system trusted keyrings Mar 17 18:42:26.149649 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Mar 17 18:42:26.149666 kernel: Key type asymmetric registered Mar 17 18:42:26.149684 kernel: Asymmetric key parser 'x509' registered Mar 17 18:42:26.149705 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:42:26.149724 kernel: io scheduler mq-deadline registered Mar 17 18:42:26.149741 kernel: io scheduler kyber registered Mar 17 18:42:26.149759 kernel: io scheduler bfq registered Mar 17 18:42:26.149777 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 18:42:26.149797 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 17 18:42:26.149968 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Mar 17 18:42:26.149992 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Mar 17 18:42:26.150162 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Mar 17 18:42:26.150190 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 17 18:42:26.150372 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Mar 17 18:42:26.150395 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:42:26.159495 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 18:42:26.159521 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Mar 17 18:42:26.159541 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Mar 17 18:42:26.159559 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Mar 17 18:42:26.159786 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Mar 17 18:42:26.159818 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 18:42:26.159834 kernel: i8042: Warning: Keylock active Mar 17 18:42:26.159856 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 18:42:26.159877 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 18:42:26.160069 kernel: rtc_cmos 00:00: RTC can wake from S4 Mar 17 18:42:26.160221 kernel: rtc_cmos 00:00: registered as rtc0 Mar 17 18:42:26.160368 kernel: rtc_cmos 00:00: setting system clock to 2025-03-17T18:42:25 UTC (1742236945) Mar 17 18:42:26.160534 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Mar 17 18:42:26.160562 kernel: intel_pstate: CPU model not supported Mar 17 18:42:26.160579 kernel: pstore: Registered efi as persistent store backend Mar 17 18:42:26.160596 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:42:26.160612 kernel: Segment Routing with IPv6 Mar 17 18:42:26.160629 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:42:26.160646 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:42:26.160663 kernel: Key type dns_resolver registered Mar 17 18:42:26.160680 kernel: IPI shorthand broadcast: enabled Mar 17 18:42:26.160697 kernel: sched_clock: Marking stable (781583953, 163626669)->(1001885672, -56675050) Mar 17 18:42:26.160718 kernel: registered taskstats version 1 Mar 17 18:42:26.160735 kernel: Loading compiled-in X.509 certificates Mar 17 18:42:26.160752 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 18:42:26.160769 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 18:42:26.160785 kernel: Key type .fscrypt registered Mar 17 18:42:26.160802 kernel: Key type fscrypt-provisioning registered Mar 17 18:42:26.160819 kernel: pstore: Using crash dump compression: deflate Mar 17 18:42:26.160835 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:42:26.160852 kernel: ima: No architecture policies found Mar 17 18:42:26.160872 kernel: clk: Disabling unused clocks Mar 17 18:42:26.160888 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 18:42:26.160905 kernel: Write protecting the kernel read-only data: 28672k Mar 17 18:42:26.160921 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 18:42:26.160938 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 18:42:26.160955 kernel: Run /init as init process Mar 17 18:42:26.160972 kernel: with arguments: Mar 17 18:42:26.160988 kernel: /init Mar 17 18:42:26.161013 kernel: with environment: Mar 17 18:42:26.161033 kernel: HOME=/ Mar 17 18:42:26.161049 kernel: TERM=linux Mar 17 18:42:26.161065 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:42:26.161087 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:42:26.161108 systemd[1]: Detected virtualization kvm. Mar 17 18:42:26.161126 systemd[1]: Detected architecture x86-64. Mar 17 18:42:26.161143 systemd[1]: Running in initrd. Mar 17 18:42:26.161163 systemd[1]: No hostname configured, using default hostname. Mar 17 18:42:26.161181 systemd[1]: Hostname set to . Mar 17 18:42:26.161199 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:42:26.161216 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:42:26.161233 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:42:26.161251 systemd[1]: Reached target cryptsetup.target. Mar 17 18:42:26.161269 systemd[1]: Reached target paths.target. Mar 17 18:42:26.161286 systemd[1]: Reached target slices.target. Mar 17 18:42:26.161306 systemd[1]: Reached target swap.target. Mar 17 18:42:26.161323 systemd[1]: Reached target timers.target. Mar 17 18:42:26.161342 systemd[1]: Listening on iscsid.socket. Mar 17 18:42:26.161359 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:42:26.161377 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:42:26.161395 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:42:26.161430 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:42:26.161447 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:42:26.161468 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:42:26.161487 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:42:26.161522 systemd[1]: Reached target sockets.target. Mar 17 18:42:26.161544 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:42:26.161562 systemd[1]: Finished network-cleanup.service. Mar 17 18:42:26.161580 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:42:26.161598 systemd[1]: Starting systemd-journald.service... Mar 17 18:42:26.161620 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:42:26.161638 systemd[1]: Starting systemd-resolved.service... Mar 17 18:42:26.161656 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:42:26.161674 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:42:26.161693 kernel: audit: type=1130 audit(1742236946.152:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.161711 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:42:26.161737 systemd-journald[190]: Journal started Mar 17 18:42:26.161826 systemd-journald[190]: Runtime Journal (/run/log/journal/923b375863ab449749902d9e16e0dd77) is 8.0M, max 148.8M, 140.8M free. Mar 17 18:42:26.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.174425 kernel: audit: type=1130 audit(1742236946.164:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.174474 systemd[1]: Started systemd-journald.service. Mar 17 18:42:26.176924 systemd-modules-load[191]: Inserted module 'overlay' Mar 17 18:42:26.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.188333 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:42:26.195571 kernel: audit: type=1130 audit(1742236946.186:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.193336 systemd-resolved[192]: Positive Trust Anchors: Mar 17 18:42:26.193348 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:42:26.193431 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:42:26.221550 kernel: audit: type=1130 audit(1742236946.203:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.198838 systemd-resolved[192]: Defaulting to hostname 'linux'. Mar 17 18:42:26.205193 systemd[1]: Started systemd-resolved.service. Mar 17 18:42:26.236954 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:42:26.244112 kernel: Bridge firewalling registered Mar 17 18:42:26.244200 kernel: audit: type=1130 audit(1742236946.239:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.240475 systemd-modules-load[191]: Inserted module 'br_netfilter' Mar 17 18:42:26.244816 systemd[1]: Reached target nss-lookup.target. Mar 17 18:42:26.257882 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:42:26.269793 kernel: SCSI subsystem initialized Mar 17 18:42:26.273518 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:42:26.291050 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:42:26.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.297627 kernel: audit: type=1130 audit(1742236946.289:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.297664 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:42:26.301991 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:42:26.302499 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:42:26.302476 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:42:26.312622 kernel: audit: type=1130 audit(1742236946.306:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.309037 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:42:26.313775 systemd-modules-load[191]: Inserted module 'dm_multipath' Mar 17 18:42:26.320789 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:42:26.328627 dracut-cmdline[206]: dracut-dracut-053 Mar 17 18:42:26.332566 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:42:26.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.349908 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:42:26.363577 kernel: audit: type=1130 audit(1742236946.347:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.364612 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:42:26.375569 kernel: audit: type=1130 audit(1742236946.367:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.426452 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:42:26.447457 kernel: iscsi: registered transport (tcp) Mar 17 18:42:26.474473 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:42:26.474570 kernel: QLogic iSCSI HBA Driver Mar 17 18:42:26.521753 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:42:26.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.527115 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:42:26.590496 kernel: raid6: avx2x4 gen() 17412 MB/s Mar 17 18:42:26.611479 kernel: raid6: avx2x4 xor() 7639 MB/s Mar 17 18:42:26.632466 kernel: raid6: avx2x2 gen() 17547 MB/s Mar 17 18:42:26.653467 kernel: raid6: avx2x2 xor() 18368 MB/s Mar 17 18:42:26.674457 kernel: raid6: avx2x1 gen() 13719 MB/s Mar 17 18:42:26.695455 kernel: raid6: avx2x1 xor() 15980 MB/s Mar 17 18:42:26.716465 kernel: raid6: sse2x4 gen() 10920 MB/s Mar 17 18:42:26.737460 kernel: raid6: sse2x4 xor() 6416 MB/s Mar 17 18:42:26.758463 kernel: raid6: sse2x2 gen() 11712 MB/s Mar 17 18:42:26.779450 kernel: raid6: sse2x2 xor() 7349 MB/s Mar 17 18:42:26.800452 kernel: raid6: sse2x1 gen() 10390 MB/s Mar 17 18:42:26.826440 kernel: raid6: sse2x1 xor() 5253 MB/s Mar 17 18:42:26.826513 kernel: raid6: using algorithm avx2x2 gen() 17547 MB/s Mar 17 18:42:26.826535 kernel: raid6: .... xor() 18368 MB/s, rmw enabled Mar 17 18:42:26.831696 kernel: raid6: using avx2x2 recovery algorithm Mar 17 18:42:26.857465 kernel: xor: automatically using best checksumming function avx Mar 17 18:42:26.970444 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 18:42:26.982747 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:42:26.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.982000 audit: BPF prog-id=7 op=LOAD Mar 17 18:42:26.982000 audit: BPF prog-id=8 op=LOAD Mar 17 18:42:26.984254 systemd[1]: Starting systemd-udevd.service... Mar 17 18:42:27.002060 systemd-udevd[388]: Using default interface naming scheme 'v252'. Mar 17 18:42:27.020781 systemd[1]: Started systemd-udevd.service. Mar 17 18:42:27.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.030800 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:42:27.045562 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Mar 17 18:42:27.086421 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:42:27.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.095802 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:42:27.164939 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:42:27.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.259437 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:42:27.355889 kernel: scsi host0: Virtio SCSI HBA Mar 17 18:42:27.375432 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 18:42:27.392441 kernel: AES CTR mode by8 optimization enabled Mar 17 18:42:27.392520 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Mar 17 18:42:27.469199 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Mar 17 18:42:27.528435 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Mar 17 18:42:27.528688 kernel: sd 0:0:1:0: [sda] Write Protect is off Mar 17 18:42:27.528963 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Mar 17 18:42:27.529173 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 17 18:42:27.529380 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 18:42:27.529425 kernel: GPT:17805311 != 25165823 Mar 17 18:42:27.529449 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 18:42:27.529471 kernel: GPT:17805311 != 25165823 Mar 17 18:42:27.529492 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 18:42:27.529515 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:42:27.529546 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Mar 17 18:42:27.591432 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (436) Mar 17 18:42:27.594778 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:42:27.610276 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:42:27.628602 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:42:27.654640 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:42:27.678726 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:42:27.679995 systemd[1]: Starting disk-uuid.service... Mar 17 18:42:27.701793 disk-uuid[511]: Primary Header is updated. Mar 17 18:42:27.701793 disk-uuid[511]: Secondary Entries is updated. Mar 17 18:42:27.701793 disk-uuid[511]: Secondary Header is updated. Mar 17 18:42:27.741554 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:42:27.741585 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:42:27.768441 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:42:28.759177 disk-uuid[512]: The operation has completed successfully. Mar 17 18:42:28.767562 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:42:28.825092 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:42:28.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:28.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:28.825230 systemd[1]: Finished disk-uuid.service. Mar 17 18:42:28.847550 systemd[1]: Starting verity-setup.service... Mar 17 18:42:28.876445 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Mar 17 18:42:28.967054 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:42:28.969392 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:42:28.996086 systemd[1]: Finished verity-setup.service. Mar 17 18:42:28.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.073455 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:42:29.073623 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:42:29.080868 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:42:29.126716 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:42:29.126764 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:42:29.126796 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:42:29.081986 systemd[1]: Starting ignition-setup.service... Mar 17 18:42:29.150616 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:42:29.096714 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:42:29.158925 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:42:29.176520 systemd[1]: Finished ignition-setup.service. Mar 17 18:42:29.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.186845 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:42:29.230622 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:42:29.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.230000 audit: BPF prog-id=9 op=LOAD Mar 17 18:42:29.232746 systemd[1]: Starting systemd-networkd.service... Mar 17 18:42:29.267599 systemd-networkd[686]: lo: Link UP Mar 17 18:42:29.267614 systemd-networkd[686]: lo: Gained carrier Mar 17 18:42:29.268604 systemd-networkd[686]: Enumeration completed Mar 17 18:42:29.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.268750 systemd[1]: Started systemd-networkd.service. Mar 17 18:42:29.269165 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:42:29.271671 systemd-networkd[686]: eth0: Link UP Mar 17 18:42:29.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.271679 systemd-networkd[686]: eth0: Gained carrier Mar 17 18:42:29.285736 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.56/32, gateway 10.128.0.1 acquired from 169.254.169.254 Mar 17 18:42:29.372548 iscsid[696]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:42:29.372548 iscsid[696]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 18:42:29.372548 iscsid[696]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:42:29.372548 iscsid[696]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:42:29.372548 iscsid[696]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:42:29.372548 iscsid[696]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:42:29.372548 iscsid[696]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:42:29.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.288803 systemd[1]: Reached target network.target. Mar 17 18:42:29.491343 ignition[650]: Ignition 2.14.0 Mar 17 18:42:29.311779 systemd[1]: Starting iscsiuio.service... Mar 17 18:42:29.491375 ignition[650]: Stage: fetch-offline Mar 17 18:42:29.321480 systemd[1]: Started iscsiuio.service. Mar 17 18:42:29.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.491514 ignition[650]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:29.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.339821 systemd[1]: Starting iscsid.service... Mar 17 18:42:29.491559 ignition[650]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:29.359895 systemd[1]: Started iscsid.service. Mar 17 18:42:29.512477 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:29.387016 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:42:29.512702 ignition[650]: parsed url from cmdline: "" Mar 17 18:42:29.424164 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:42:29.512708 ignition[650]: no config URL provided Mar 17 18:42:29.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.460784 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:42:29.512716 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:42:29.470727 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:42:29.512728 ignition[650]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:42:29.514669 systemd[1]: Reached target remote-fs.target. Mar 17 18:42:29.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.512737 ignition[650]: failed to fetch config: resource requires networking Mar 17 18:42:29.530903 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:42:29.512896 ignition[650]: Ignition finished successfully Mar 17 18:42:29.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:29.544137 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:42:29.591312 ignition[711]: Ignition 2.14.0 Mar 17 18:42:29.563186 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:42:29.591323 ignition[711]: Stage: fetch Mar 17 18:42:29.579247 systemd[1]: Starting ignition-fetch.service... Mar 17 18:42:29.591504 ignition[711]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:29.612585 unknown[711]: fetched base config from "system" Mar 17 18:42:29.591538 ignition[711]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:29.612597 unknown[711]: fetched base config from "system" Mar 17 18:42:29.599025 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:29.612606 unknown[711]: fetched user config from "gcp" Mar 17 18:42:29.599222 ignition[711]: parsed url from cmdline: "" Mar 17 18:42:29.630139 systemd[1]: Finished ignition-fetch.service. Mar 17 18:42:29.599228 ignition[711]: no config URL provided Mar 17 18:42:29.645974 systemd[1]: Starting ignition-kargs.service... Mar 17 18:42:29.599235 ignition[711]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:42:29.685071 systemd[1]: Finished ignition-kargs.service. Mar 17 18:42:29.599245 ignition[711]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:42:29.702289 systemd[1]: Starting ignition-disks.service... Mar 17 18:42:29.599283 ignition[711]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Mar 17 18:42:29.725969 systemd[1]: Finished ignition-disks.service. Mar 17 18:42:29.606297 ignition[711]: GET result: OK Mar 17 18:42:29.741822 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:42:29.606430 ignition[711]: parsing config with SHA512: fa21dd900bbd45da4c074f285051a406acc89d6ec7d2014209d2ecb5357b2123ac2b75a79752d9d92945ca975010e64f75498988623dbeeba97ba4e556a27e5b Mar 17 18:42:29.756631 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:42:29.613361 ignition[711]: fetch: fetch complete Mar 17 18:42:29.756820 systemd[1]: Reached target local-fs.target. Mar 17 18:42:29.613368 ignition[711]: fetch: fetch passed Mar 17 18:42:29.778611 systemd[1]: Reached target sysinit.target. Mar 17 18:42:29.613451 ignition[711]: Ignition finished successfully Mar 17 18:42:29.790623 systemd[1]: Reached target basic.target. Mar 17 18:42:29.660050 ignition[717]: Ignition 2.14.0 Mar 17 18:42:29.792038 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:42:29.660059 ignition[717]: Stage: kargs Mar 17 18:42:29.660204 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:29.660235 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:29.668473 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:29.669804 ignition[717]: kargs: kargs passed Mar 17 18:42:29.669862 ignition[717]: Ignition finished successfully Mar 17 18:42:29.715101 ignition[723]: Ignition 2.14.0 Mar 17 18:42:29.715111 ignition[723]: Stage: disks Mar 17 18:42:29.715243 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:29.715280 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:29.723294 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:29.724922 ignition[723]: disks: disks passed Mar 17 18:42:29.724978 ignition[723]: Ignition finished successfully Mar 17 18:42:29.836937 systemd-fsck[731]: ROOT: clean, 623/1628000 files, 124059/1617920 blocks Mar 17 18:42:30.037442 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:42:30.088717 kernel: kauditd_printk_skb: 22 callbacks suppressed Mar 17 18:42:30.088758 kernel: audit: type=1130 audit(1742236950.044:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.088781 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:42:30.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.047139 systemd[1]: Mounting sysroot.mount... Mar 17 18:42:30.096908 systemd[1]: Mounted sysroot.mount. Mar 17 18:42:30.109929 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:42:30.128710 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:42:30.140227 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 18:42:30.140286 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:42:30.140323 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:42:30.229261 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (737) Mar 17 18:42:30.229306 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:42:30.229328 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:42:30.229358 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:42:30.155948 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:42:30.248557 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:42:30.179420 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:42:30.257599 initrd-setup-root[742]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:42:30.205173 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:42:30.284599 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:42:30.255614 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:42:30.303589 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:42:30.313565 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:42:30.337664 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:42:30.371628 kernel: audit: type=1130 audit(1742236950.336:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.339200 systemd[1]: Starting ignition-mount.service... Mar 17 18:42:30.379750 systemd[1]: Starting sysroot-boot.service... Mar 17 18:42:30.393860 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 18:42:30.394008 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 18:42:30.420625 ignition[803]: INFO : Ignition 2.14.0 Mar 17 18:42:30.420625 ignition[803]: INFO : Stage: mount Mar 17 18:42:30.420625 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:30.420625 ignition[803]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:30.521751 kernel: audit: type=1130 audit(1742236950.436:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.521799 kernel: audit: type=1130 audit(1742236950.480:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:30.425885 systemd[1]: Finished sysroot-boot.service. Mar 17 18:42:30.535606 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:30.535606 ignition[803]: INFO : mount: mount passed Mar 17 18:42:30.535606 ignition[803]: INFO : Ignition finished successfully Mar 17 18:42:30.599704 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812) Mar 17 18:42:30.599760 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:42:30.599785 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:42:30.599800 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:42:30.599830 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:42:30.438096 systemd[1]: Finished ignition-mount.service. Mar 17 18:42:30.483223 systemd[1]: Starting ignition-files.service... Mar 17 18:42:30.532922 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:42:30.631625 ignition[831]: INFO : Ignition 2.14.0 Mar 17 18:42:30.631625 ignition[831]: INFO : Stage: files Mar 17 18:42:30.631625 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:30.631625 ignition[831]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:30.631625 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:30.597709 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:42:30.698609 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:42:30.698609 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:42:30.698609 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:42:30.698609 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:42:30.698609 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:42:30.698609 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015999836" Mar 17 18:42:30.698609 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015999836": device or resource busy Mar 17 18:42:30.698609 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4015999836", trying btrfs: device or resource busy Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015999836" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015999836" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem4015999836" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem4015999836" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Mar 17 18:42:30.698609 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 18:42:30.649094 unknown[831]: wrote ssh authorized keys file for user: core Mar 17 18:42:30.961601 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Mar 17 18:42:30.961601 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Mar 17 18:42:30.895554 systemd-networkd[686]: eth0: Gained IPv6LL Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem876679346" Mar 17 18:42:30.997571 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem876679346": device or resource busy Mar 17 18:42:30.997571 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem876679346", trying btrfs: device or resource busy Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem876679346" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem876679346" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem876679346" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem876679346" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Mar 17 18:42:30.997571 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3335968306" Mar 17 18:42:31.247629 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3335968306": device or resource busy Mar 17 18:42:31.247629 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3335968306", trying btrfs: device or resource busy Mar 17 18:42:31.247629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3335968306" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3335968306" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3335968306" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3335968306" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707818800" Mar 17 18:42:31.494618 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707818800": device or resource busy Mar 17 18:42:31.494618 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1707818800", trying btrfs: device or resource busy Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707818800" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1707818800" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem1707818800" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem1707818800" Mar 17 18:42:31.494618 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Mar 17 18:42:31.740630 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:42:31.740630 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Mar 17 18:42:31.740630 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Mar 17 18:42:31.812595 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Mar 17 18:42:31.812595 ignition[831]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Mar 17 18:42:32.019772 kernel: audit: type=1130 audit(1742236951.830:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.019821 kernel: audit: type=1130 audit(1742236951.926:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.019839 kernel: audit: type=1130 audit(1742236951.967:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.019855 kernel: audit: type=1131 audit(1742236951.967:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:31.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:31.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:31.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:31.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Mar 17 18:42:32.020020 ignition[831]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:42:32.020020 ignition[831]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:42:32.020020 ignition[831]: INFO : files: files passed Mar 17 18:42:32.020020 ignition[831]: INFO : Ignition finished successfully Mar 17 18:42:32.361739 kernel: audit: type=1130 audit(1742236952.084:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.361788 kernel: audit: type=1131 audit(1742236952.106:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:31.823155 systemd[1]: Finished ignition-files.service. Mar 17 18:42:31.841674 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:42:32.393712 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:42:31.869803 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:42:31.870999 systemd[1]: Starting ignition-quench.service... Mar 17 18:42:31.890110 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:42:31.928077 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:42:31.928220 systemd[1]: Finished ignition-quench.service. Mar 17 18:42:31.968993 systemd[1]: Reached target ignition-complete.target. Mar 17 18:42:32.038742 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:42:32.068606 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:42:32.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.068767 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:42:32.107756 systemd[1]: Reached target initrd-fs.target. Mar 17 18:42:32.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.157764 systemd[1]: Reached target initrd.target. Mar 17 18:42:32.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.171954 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:42:32.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.173300 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:42:32.646746 ignition[869]: INFO : Ignition 2.14.0 Mar 17 18:42:32.646746 ignition[869]: INFO : Stage: umount Mar 17 18:42:32.646746 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:32.646746 ignition[869]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:42:32.646746 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:42:32.646746 ignition[869]: INFO : umount: umount passed Mar 17 18:42:32.646746 ignition[869]: INFO : Ignition finished successfully Mar 17 18:42:32.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.763908 iscsid[696]: iscsid shutting down. Mar 17 18:42:32.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.192141 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:42:32.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.232209 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:42:32.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.259742 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:42:32.272877 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:42:32.293901 systemd[1]: Stopped target timers.target. Mar 17 18:42:32.316868 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:42:32.317061 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:42:32.340087 systemd[1]: Stopped target initrd.target. Mar 17 18:42:32.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.353884 systemd[1]: Stopped target basic.target. Mar 17 18:42:32.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.368866 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:42:32.383913 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:42:32.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.402848 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:42:32.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.425925 systemd[1]: Stopped target remote-fs.target. Mar 17 18:42:32.452872 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:42:32.467878 systemd[1]: Stopped target sysinit.target. Mar 17 18:42:32.484862 systemd[1]: Stopped target local-fs.target. Mar 17 18:42:32.502894 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:42:32.517835 systemd[1]: Stopped target swap.target. Mar 17 18:42:33.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.532820 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:42:33.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:33.046000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:42:32.533022 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:42:32.541124 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:42:32.564866 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:42:33.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.565067 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:42:33.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.572074 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:42:33.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.572258 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:42:32.596038 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:42:33.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.596221 systemd[1]: Stopped ignition-files.service. Mar 17 18:42:32.613495 systemd[1]: Stopping ignition-mount.service... Mar 17 18:42:32.629945 systemd[1]: Stopping iscsid.service... Mar 17 18:42:33.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.638988 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:42:33.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.653609 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:42:33.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.653862 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:42:32.662928 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:42:33.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.663110 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:42:33.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.673880 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:42:33.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.675059 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:42:33.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.675185 systemd[1]: Stopped iscsid.service. Mar 17 18:42:33.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:33.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:32.683756 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:42:32.683892 systemd[1]: Stopped ignition-mount.service. Mar 17 18:42:32.700477 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:42:32.700607 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:42:32.743667 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:42:32.743822 systemd[1]: Stopped ignition-disks.service. Mar 17 18:42:33.412646 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Mar 17 18:42:32.749867 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:42:32.749938 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:42:32.772764 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:42:32.772845 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:42:32.787727 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:42:32.787810 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:42:32.802753 systemd[1]: Stopped target paths.target. Mar 17 18:42:32.816600 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:42:32.820581 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:42:32.831615 systemd[1]: Stopped target slices.target. Mar 17 18:42:32.845611 systemd[1]: Stopped target sockets.target. Mar 17 18:42:32.858684 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:42:32.858763 systemd[1]: Closed iscsid.socket. Mar 17 18:42:32.873651 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:42:32.873747 systemd[1]: Stopped ignition-setup.service. Mar 17 18:42:32.888741 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:42:32.888820 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:42:32.903840 systemd[1]: Stopping iscsiuio.service... Mar 17 18:42:32.918078 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:42:32.918204 systemd[1]: Stopped iscsiuio.service. Mar 17 18:42:32.934032 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:42:32.934146 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:42:32.950787 systemd[1]: Stopped target network.target. Mar 17 18:42:32.965620 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:42:32.965703 systemd[1]: Closed iscsiuio.socket. Mar 17 18:42:32.979876 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:42:32.983518 systemd-networkd[686]: eth0: DHCPv6 lease lost Mar 17 18:42:33.422000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:42:32.995883 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:42:33.012122 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:42:33.012252 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:42:33.033445 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:42:33.033597 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:42:33.048432 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:42:33.048493 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:42:33.064678 systemd[1]: Stopping network-cleanup.service... Mar 17 18:42:33.071784 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:42:33.071875 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:42:33.093844 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:42:33.093921 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:42:33.109918 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:42:33.109985 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:42:33.124927 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:42:33.144385 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:42:33.145048 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:42:33.145206 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:42:33.160335 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:42:33.160456 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:42:33.174800 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:42:33.174856 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:42:33.190768 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:42:33.190846 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:42:33.205843 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:42:33.205916 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:42:33.220829 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:42:33.220902 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:42:33.236945 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:42:33.253578 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 18:42:33.253726 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 18:42:33.270882 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:42:33.270950 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:42:33.289755 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:42:33.289926 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:42:33.306025 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 18:42:33.306761 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:42:33.306879 systemd[1]: Stopped network-cleanup.service. Mar 17 18:42:33.321003 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:42:33.321121 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:42:33.336926 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:42:33.353741 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:42:33.375898 systemd[1]: Switching root. Mar 17 18:42:33.425800 systemd-journald[190]: Journal stopped Mar 17 18:42:38.159110 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:42:38.159240 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:42:38.159269 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:42:38.159292 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:42:38.159319 kernel: SELinux: policy capability open_perms=1 Mar 17 18:42:38.159339 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:42:38.159360 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:42:38.159388 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:42:38.159433 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:42:38.159456 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:42:38.159478 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:42:38.159503 systemd[1]: Successfully loaded SELinux policy in 112.449ms. Mar 17 18:42:38.159543 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.437ms. Mar 17 18:42:38.159569 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:42:38.159593 systemd[1]: Detected virtualization kvm. Mar 17 18:42:38.159617 systemd[1]: Detected architecture x86-64. Mar 17 18:42:38.159640 systemd[1]: Detected first boot. Mar 17 18:42:38.159667 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:42:38.159691 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:42:38.159720 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:42:38.159755 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:42:38.159787 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:42:38.159813 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:42:38.159844 kernel: kauditd_printk_skb: 53 callbacks suppressed Mar 17 18:42:38.159870 kernel: audit: type=1334 audit(1742236957.232:89): prog-id=12 op=LOAD Mar 17 18:42:38.159893 kernel: audit: type=1334 audit(1742236957.232:90): prog-id=3 op=UNLOAD Mar 17 18:42:38.159915 kernel: audit: type=1334 audit(1742236957.244:91): prog-id=13 op=LOAD Mar 17 18:42:38.159937 kernel: audit: type=1334 audit(1742236957.251:92): prog-id=14 op=LOAD Mar 17 18:42:38.159959 kernel: audit: type=1334 audit(1742236957.251:93): prog-id=4 op=UNLOAD Mar 17 18:42:38.159982 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:42:38.160005 kernel: audit: type=1334 audit(1742236957.251:94): prog-id=5 op=UNLOAD Mar 17 18:42:38.160027 kernel: audit: type=1131 audit(1742236957.253:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.160054 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:42:38.160077 kernel: audit: type=1334 audit(1742236957.309:96): prog-id=12 op=UNLOAD Mar 17 18:42:38.160099 kernel: audit: type=1130 audit(1742236957.331:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.160122 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:42:38.160146 kernel: audit: type=1131 audit(1742236957.331:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.160168 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:42:38.160192 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:42:38.160216 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 18:42:38.160244 systemd[1]: Created slice system-getty.slice. Mar 17 18:42:38.160268 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:42:38.160291 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:42:38.160314 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:42:38.160339 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:42:38.160364 systemd[1]: Created slice user.slice. Mar 17 18:42:38.160387 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:42:38.160427 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:42:38.160451 systemd[1]: Set up automount boot.automount. Mar 17 18:42:38.160475 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:42:38.160499 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:42:38.160523 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:42:38.160546 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:42:38.160568 systemd[1]: Reached target integritysetup.target. Mar 17 18:42:38.160593 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:42:38.160616 systemd[1]: Reached target remote-fs.target. Mar 17 18:42:38.160639 systemd[1]: Reached target slices.target. Mar 17 18:42:38.160665 systemd[1]: Reached target swap.target. Mar 17 18:42:38.160690 systemd[1]: Reached target torcx.target. Mar 17 18:42:38.160713 systemd[1]: Reached target veritysetup.target. Mar 17 18:42:38.160744 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:42:38.160768 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:42:38.160792 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:42:38.160816 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:42:38.160840 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:42:38.160864 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:42:38.160891 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:42:38.160914 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:42:38.160936 systemd[1]: Mounting media.mount... Mar 17 18:42:38.160960 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:38.160988 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:42:38.161011 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:42:38.161034 systemd[1]: Mounting tmp.mount... Mar 17 18:42:38.161058 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:42:38.161082 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:38.161109 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:42:38.161132 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:42:38.161155 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:38.161178 systemd[1]: Starting modprobe@drm.service... Mar 17 18:42:38.161201 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:38.161224 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:42:38.161247 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:38.161272 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:42:38.161295 kernel: loop: module loaded Mar 17 18:42:38.161320 kernel: fuse: init (API version 7.34) Mar 17 18:42:38.161342 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:42:38.161367 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:42:38.161390 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:42:38.161426 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:42:38.161449 systemd[1]: Stopped systemd-journald.service. Mar 17 18:42:38.161473 systemd[1]: Starting systemd-journald.service... Mar 17 18:42:38.161496 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:42:38.161526 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:42:38.161560 systemd-journald[993]: Journal started Mar 17 18:42:38.161652 systemd-journald[993]: Runtime Journal (/run/log/journal/923b375863ab449749902d9e16e0dd77) is 8.0M, max 148.8M, 140.8M free. Mar 17 18:42:33.741000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:42:33.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:42:33.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:42:33.893000 audit: BPF prog-id=10 op=LOAD Mar 17 18:42:33.893000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:42:33.893000 audit: BPF prog-id=11 op=LOAD Mar 17 18:42:33.893000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:42:34.055000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:42:34.055000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878dc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.055000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:42:34.066000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:42:34.066000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879b5 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.066000 audit: CWD cwd="/" Mar 17 18:42:34.066000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:34.066000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:34.066000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:42:37.232000 audit: BPF prog-id=12 op=LOAD Mar 17 18:42:37.232000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:42:37.244000 audit: BPF prog-id=13 op=LOAD Mar 17 18:42:37.251000 audit: BPF prog-id=14 op=LOAD Mar 17 18:42:37.251000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:42:37.251000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:42:37.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:37.309000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:42:37.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:37.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.122000 audit: BPF prog-id=15 op=LOAD Mar 17 18:42:38.122000 audit: BPF prog-id=16 op=LOAD Mar 17 18:42:38.122000 audit: BPF prog-id=17 op=LOAD Mar 17 18:42:38.122000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:42:38.122000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:42:38.154000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:42:38.154000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe987f8ed0 a2=4000 a3=7ffe987f8f6c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:38.154000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:42:34.051766 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:42:37.230860 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:42:34.052929 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:42:37.230877 systemd[1]: Unnecessary job was removed for dev-sda6.device. Mar 17 18:42:34.052965 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:42:37.254357 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:42:34.053019 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:42:34.053039 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:42:34.053097 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:42:34.053122 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:42:34.053513 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:42:34.053581 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:42:34.053615 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:42:34.055276 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:42:34.055345 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:42:34.055379 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:42:34.055422 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:42:34.055466 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:42:34.055492 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:42:36.596047 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:36.596363 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:36.596536 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:36.596773 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:36.596836 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:42:36.596907 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-03-17T18:42:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:42:38.183454 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:42:38.198539 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:42:38.218115 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:42:38.218226 systemd[1]: Stopped verity-setup.service. Mar 17 18:42:38.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.238483 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:38.247539 systemd[1]: Started systemd-journald.service. Mar 17 18:42:38.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.256893 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:42:38.263802 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:42:38.270789 systemd[1]: Mounted media.mount. Mar 17 18:42:38.277811 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:42:38.286849 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:42:38.295779 systemd[1]: Mounted tmp.mount. Mar 17 18:42:38.302967 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:42:38.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.312082 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:42:38.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.320989 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:42:38.321224 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:42:38.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.330093 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:38.330325 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:38.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.339084 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:42:38.339308 systemd[1]: Finished modprobe@drm.service. Mar 17 18:42:38.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.348058 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:38.348283 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:38.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.357102 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:42:38.357336 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:42:38.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.366091 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:38.366309 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:38.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.375221 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:42:38.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.384019 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:42:38.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.393037 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:42:38.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.402089 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:42:38.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.411506 systemd[1]: Reached target network-pre.target. Mar 17 18:42:38.422310 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:42:38.433184 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:42:38.440619 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:42:38.444641 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:42:38.453454 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:42:38.461616 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:38.463441 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:42:38.470629 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:38.472548 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:42:38.475125 systemd-journald[993]: Time spent on flushing to /var/log/journal/923b375863ab449749902d9e16e0dd77 is 67.607ms for 1154 entries. Mar 17 18:42:38.475125 systemd-journald[993]: System Journal (/var/log/journal/923b375863ab449749902d9e16e0dd77) is 8.0M, max 584.8M, 576.8M free. Mar 17 18:42:38.573197 systemd-journald[993]: Received client request to flush runtime journal. Mar 17 18:42:38.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.489619 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:42:38.499489 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:42:38.510108 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:42:38.518796 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:42:38.528016 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:42:38.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:38.593691 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Mar 17 18:42:38.537084 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:42:38.549383 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:42:38.558204 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:42:38.569193 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:42:38.580762 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:42:38.641007 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:42:38.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.186831 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:42:39.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.195000 audit: BPF prog-id=18 op=LOAD Mar 17 18:42:39.195000 audit: BPF prog-id=19 op=LOAD Mar 17 18:42:39.195000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:42:39.195000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:42:39.197641 systemd[1]: Starting systemd-udevd.service... Mar 17 18:42:39.221033 systemd-udevd[1012]: Using default interface naming scheme 'v252'. Mar 17 18:42:39.279114 systemd[1]: Started systemd-udevd.service. Mar 17 18:42:39.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.289000 audit: BPF prog-id=20 op=LOAD Mar 17 18:42:39.291955 systemd[1]: Starting systemd-networkd.service... Mar 17 18:42:39.306000 audit: BPF prog-id=21 op=LOAD Mar 17 18:42:39.306000 audit: BPF prog-id=22 op=LOAD Mar 17 18:42:39.306000 audit: BPF prog-id=23 op=LOAD Mar 17 18:42:39.309089 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:42:39.373589 systemd[1]: Started systemd-userdbd.service. Mar 17 18:42:39.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.388390 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:42:39.475459 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 17 18:42:39.517912 systemd-networkd[1027]: lo: Link UP Mar 17 18:42:39.517927 systemd-networkd[1027]: lo: Gained carrier Mar 17 18:42:39.518698 systemd-networkd[1027]: Enumeration completed Mar 17 18:42:39.518847 systemd[1]: Started systemd-networkd.service. Mar 17 18:42:39.519231 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:42:39.521714 systemd-networkd[1027]: eth0: Link UP Mar 17 18:42:39.522006 systemd-networkd[1027]: eth0: Gained carrier Mar 17 18:42:39.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.533607 systemd-networkd[1027]: eth0: DHCPv4 address 10.128.0.56/32, gateway 10.128.0.1 acquired from 169.254.169.254 Mar 17 18:42:39.545457 kernel: ACPI: button: Power Button [PWRF] Mar 17 18:42:39.518000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:42:39.518000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55da13ff3f10 a1=338ac a2=7fb36f9d4bc5 a3=5 items=110 ppid=1012 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:39.518000 audit: CWD cwd="/" Mar 17 18:42:39.518000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=1 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=2 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=3 name=(null) inode=14279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=4 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=5 name=(null) inode=14280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=6 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=7 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=8 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=9 name=(null) inode=14282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=10 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=11 name=(null) inode=14283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=12 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=13 name=(null) inode=14284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=14 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=15 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=16 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=17 name=(null) inode=14286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=18 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=19 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=20 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=21 name=(null) inode=14288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=22 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=23 name=(null) inode=14289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=24 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=25 name=(null) inode=14290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=26 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=27 name=(null) inode=14291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=28 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=29 name=(null) inode=14292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=30 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=31 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=32 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=33 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=34 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=35 name=(null) inode=14295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=36 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=37 name=(null) inode=14296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=38 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=39 name=(null) inode=14297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=40 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=41 name=(null) inode=14298 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=42 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=43 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=44 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=45 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=46 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=47 name=(null) inode=14301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=48 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=49 name=(null) inode=14302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=50 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=51 name=(null) inode=14303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=52 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=53 name=(null) inode=14304 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=55 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=56 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=57 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=58 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=59 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=60 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=61 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=62 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=63 name=(null) inode=14309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=64 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=65 name=(null) inode=14310 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=66 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=67 name=(null) inode=14311 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=68 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=69 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=70 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=71 name=(null) inode=14313 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=72 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=73 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=74 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=75 name=(null) inode=14315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=76 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=77 name=(null) inode=14316 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=78 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=79 name=(null) inode=14317 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=80 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=81 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=82 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=83 name=(null) inode=14319 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=84 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=85 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=86 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=87 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=88 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=89 name=(null) inode=14322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=90 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=91 name=(null) inode=14323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=92 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=93 name=(null) inode=14324 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=94 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=95 name=(null) inode=14325 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=96 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=97 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=98 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=99 name=(null) inode=14327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=100 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=101 name=(null) inode=14328 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=102 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=103 name=(null) inode=14329 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=104 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=105 name=(null) inode=14330 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=106 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=107 name=(null) inode=14331 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PATH item=109 name=(null) inode=14332 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:39.518000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:42:39.595544 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Mar 17 18:42:39.619444 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Mar 17 18:42:39.629386 kernel: EDAC MC: Ver: 3.0.0 Mar 17 18:42:39.651893 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Mar 17 18:42:39.665461 kernel: ACPI: button: Sleep Button [SLPF] Mar 17 18:42:39.677495 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:42:39.690117 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:42:39.702989 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:42:39.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.713444 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:42:39.744750 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:42:39.774850 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:42:39.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.783875 systemd[1]: Reached target cryptsetup.target. Mar 17 18:42:39.794156 systemd[1]: Starting lvm2-activation.service... Mar 17 18:42:39.800449 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:42:39.828877 systemd[1]: Finished lvm2-activation.service. Mar 17 18:42:39.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.837885 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:42:39.846642 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:42:39.846698 systemd[1]: Reached target local-fs.target. Mar 17 18:42:39.855668 systemd[1]: Reached target machines.target. Mar 17 18:42:39.866321 systemd[1]: Starting ldconfig.service... Mar 17 18:42:39.875328 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:39.875445 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:39.877641 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:42:39.886375 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:42:39.898588 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:42:39.900880 systemd[1]: Starting systemd-sysext.service... Mar 17 18:42:39.901688 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1052 (bootctl) Mar 17 18:42:39.903666 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:42:39.926435 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:42:39.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:39.934042 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:42:39.937695 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:42:39.937986 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:42:39.960632 kernel: loop0: detected capacity change from 0 to 205544 Mar 17 18:42:40.074639 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) Mar 17 18:42:40.074639 systemd-fsck[1063]: /dev/sda1: 789 files, 119299/258078 clusters Mar 17 18:42:40.078592 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:42:40.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.092027 systemd[1]: Mounting boot.mount... Mar 17 18:42:40.134127 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:42:40.144770 systemd[1]: Mounted boot.mount. Mar 17 18:42:40.175466 kernel: loop1: detected capacity change from 0 to 205544 Mar 17 18:42:40.186723 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:42:40.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.213156 (sd-sysext)[1068]: Using extensions 'kubernetes'. Mar 17 18:42:40.213887 (sd-sysext)[1068]: Merged extensions into '/usr'. Mar 17 18:42:40.242909 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:40.245233 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:42:40.252795 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:40.255564 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:40.265273 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:40.275573 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:40.282681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:40.282931 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:40.283151 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:40.288366 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:42:40.296488 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:40.296717 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:40.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.306553 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:40.306840 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:40.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.316354 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:40.316807 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:40.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.327763 systemd[1]: Finished systemd-sysext.service. Mar 17 18:42:40.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.348997 systemd[1]: Starting ensure-sysext.service... Mar 17 18:42:40.356629 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:40.356746 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:40.359398 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:42:40.372617 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:42:40.373793 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:42:40.378197 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:42:40.380018 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:42:40.383086 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:42:40.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.385991 systemd[1]: Reloading. Mar 17 18:42:40.500735 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-03-17T18:42:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:42:40.500792 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-03-17T18:42:40Z" level=info msg="torcx already run" Mar 17 18:42:40.651424 ldconfig[1051]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:42:40.720120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:42:40.720320 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:42:40.744035 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:42:40.818000 audit: BPF prog-id=24 op=LOAD Mar 17 18:42:40.818000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:42:40.818000 audit: BPF prog-id=25 op=LOAD Mar 17 18:42:40.818000 audit: BPF prog-id=26 op=LOAD Mar 17 18:42:40.818000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:42:40.818000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:42:40.820000 audit: BPF prog-id=27 op=LOAD Mar 17 18:42:40.820000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:42:40.823000 audit: BPF prog-id=28 op=LOAD Mar 17 18:42:40.823000 audit: BPF prog-id=29 op=LOAD Mar 17 18:42:40.823000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:42:40.823000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:42:40.825000 audit: BPF prog-id=30 op=LOAD Mar 17 18:42:40.825000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:42:40.825000 audit: BPF prog-id=31 op=LOAD Mar 17 18:42:40.825000 audit: BPF prog-id=32 op=LOAD Mar 17 18:42:40.825000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:42:40.825000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:42:40.831038 systemd[1]: Finished ldconfig.service. Mar 17 18:42:40.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.840813 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:42:40.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.855734 systemd[1]: Starting audit-rules.service... Mar 17 18:42:40.864528 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:42:40.874922 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:42:40.883623 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:42:40.892000 audit: BPF prog-id=33 op=LOAD Mar 17 18:42:40.896081 systemd[1]: Starting systemd-resolved.service... Mar 17 18:42:40.903000 audit: BPF prog-id=34 op=LOAD Mar 17 18:42:40.906719 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:42:40.915867 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:42:40.924507 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:42:40.928000 audit[1165]: SYSTEM_BOOT pid=1165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:40.934476 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:42:40.934748 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:42:40.940000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:42:40.940000 audit[1169]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcef430ed0 a2=420 a3=0 items=0 ppid=1139 pid=1169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:40.940000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:42:40.942847 augenrules[1169]: No rules Mar 17 18:42:40.944338 systemd[1]: Finished audit-rules.service. Mar 17 18:42:40.952151 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:42:40.967863 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:40.968633 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:40.971524 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:40.982772 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:40.991781 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:41.000763 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:42:41.007777 enable-oslogin[1177]: /etc/pam.d/sshd already exists. Not enabling OS Login Mar 17 18:42:41.010664 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.011056 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:41.014571 systemd[1]: Starting systemd-update-done.service... Mar 17 18:42:41.022570 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:41.022965 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:41.027216 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:41.027486 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:41.036566 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:41.036798 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:41.048611 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:41.048845 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:41.058331 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:42:41.058607 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:42:41.067586 systemd[1]: Finished systemd-update-done.service. Mar 17 18:42:41.077007 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:41.077324 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.085629 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:41.086940 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.089518 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:41.094708 systemd-resolved[1155]: Positive Trust Anchors: Mar 17 18:42:41.095157 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:42:41.095313 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:42:41.100723 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:41.107341 systemd-resolved[1155]: Defaulting to hostname 'linux'. Mar 17 18:42:41.110782 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:41.119790 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:42:41.126636 enable-oslogin[1182]: /etc/pam.d/sshd already exists. Not enabling OS Login Mar 17 18:42:41.129637 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.129925 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:41.130116 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:41.130271 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:41.132247 systemd[1]: Started systemd-resolved.service. Mar 17 18:42:41.142457 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:42:41.151287 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:41.151529 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:41.160118 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:41.160324 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:41.162541 systemd-timesyncd[1160]: Contacted time server 169.254.169.254:123 (169.254.169.254). Mar 17 18:42:41.162625 systemd-timesyncd[1160]: Initial clock synchronization to Mon 2025-03-17 18:42:40.795582 UTC. Mar 17 18:42:41.168992 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:42:41.178711 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:41.178924 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:41.188275 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:42:41.188569 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:42:41.200978 systemd[1]: Reached target network.target. Mar 17 18:42:41.210768 systemd[1]: Reached target nss-lookup.target. Mar 17 18:42:41.220801 systemd[1]: Reached target time-set.target. Mar 17 18:42:41.229801 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:41.230269 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.232381 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:41.241574 systemd[1]: Starting modprobe@drm.service... Mar 17 18:42:41.250436 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:41.260430 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:41.269790 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:42:41.273782 enable-oslogin[1188]: /etc/pam.d/sshd already exists. Not enabling OS Login Mar 17 18:42:41.278670 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.279005 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:41.281093 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:42:41.289646 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:41.289896 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:41.292498 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:41.292728 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:41.302265 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:42:41.302536 systemd[1]: Finished modprobe@drm.service. Mar 17 18:42:41.311250 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:41.311491 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:41.320225 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:41.320481 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:41.329223 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:42:41.329520 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:42:41.338589 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:41.338785 systemd[1]: Reached target sysinit.target. Mar 17 18:42:41.347767 systemd[1]: Started motdgen.path. Mar 17 18:42:41.355675 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:42:41.365852 systemd[1]: Started logrotate.timer. Mar 17 18:42:41.372809 systemd[1]: Started mdadm.timer. Mar 17 18:42:41.379622 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:42:41.388619 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:42:41.388727 systemd[1]: Reached target paths.target. Mar 17 18:42:41.395603 systemd[1]: Reached target timers.target. Mar 17 18:42:41.403297 systemd[1]: Listening on dbus.socket. Mar 17 18:42:41.412132 systemd[1]: Starting docker.socket... Mar 17 18:42:41.424472 systemd[1]: Listening on sshd.socket. Mar 17 18:42:41.431808 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:41.431917 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.432947 systemd[1]: Finished ensure-sysext.service. Mar 17 18:42:41.441951 systemd[1]: Listening on docker.socket. Mar 17 18:42:41.449770 systemd[1]: Reached target sockets.target. Mar 17 18:42:41.455669 systemd-networkd[1027]: eth0: Gained IPv6LL Mar 17 18:42:41.458633 systemd[1]: Reached target basic.target. Mar 17 18:42:41.465701 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.465761 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:42:41.467519 systemd[1]: Starting containerd.service... Mar 17 18:42:41.476179 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 18:42:41.487524 systemd[1]: Starting dbus.service... Mar 17 18:42:41.496698 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:42:41.515202 jq[1195]: false Mar 17 18:42:41.510501 systemd[1]: Starting extend-filesystems.service... Mar 17 18:42:41.517605 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:42:41.520535 systemd[1]: Starting motdgen.service... Mar 17 18:42:41.530643 systemd[1]: Starting prepare-helm.service... Mar 17 18:42:41.539773 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:42:41.548527 systemd[1]: Starting sshd-keygen.service... Mar 17 18:42:41.559898 systemd[1]: Starting systemd-logind.service... Mar 17 18:42:41.567618 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:41.567749 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Mar 17 18:42:41.568587 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:42:41.569967 systemd[1]: Starting update-engine.service... Mar 17 18:42:41.579555 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:42:41.587141 jq[1216]: true Mar 17 18:42:41.592080 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:42:41.604593 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:42:41.604922 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:42:41.608931 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:42:41.609227 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:42:41.622718 systemd[1]: Reached target network-online.target. Mar 17 18:42:41.634225 systemd[1]: Starting kubelet.service... Mar 17 18:42:41.642166 dbus-daemon[1194]: [system] SELinux support is enabled Mar 17 18:42:41.643542 extend-filesystems[1197]: Found loop1 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda1 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda2 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda3 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found usr Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda4 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda6 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda7 Mar 17 18:42:41.658125 extend-filesystems[1197]: Found sda9 Mar 17 18:42:41.658125 extend-filesystems[1197]: Checking size of /dev/sda9 Mar 17 18:42:41.871731 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Mar 17 18:42:41.871825 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Mar 17 18:42:41.644615 systemd[1]: Starting oem-gce.service... Mar 17 18:42:41.872057 tar[1219]: linux-amd64/helm Mar 17 18:42:41.664799 dbus-daemon[1194]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1027 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Mar 17 18:42:41.872481 update_engine[1215]: I0317 18:42:41.762233 1215 main.cc:92] Flatcar Update Engine starting Mar 17 18:42:41.872481 update_engine[1215]: I0317 18:42:41.770140 1215 update_check_scheduler.cc:74] Next update check in 9m50s Mar 17 18:42:41.872829 extend-filesystems[1197]: Resized partition /dev/sda9 Mar 17 18:42:41.900691 jq[1221]: true Mar 17 18:42:41.666086 systemd[1]: Started dbus.service. Mar 17 18:42:41.693450 dbus-daemon[1194]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 17 18:42:41.901348 extend-filesystems[1238]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 18:42:41.901348 extend-filesystems[1238]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Mar 17 18:42:41.901348 extend-filesystems[1238]: old_desc_blocks = 1, new_desc_blocks = 2 Mar 17 18:42:41.901348 extend-filesystems[1238]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Mar 17 18:42:41.948629 kernel: loop2: detected capacity change from 0 to 2097152 Mar 17 18:42:41.677885 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:42:41.949059 env[1222]: time="2025-03-17T18:42:41.941577609Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:42:41.949369 extend-filesystems[1197]: Resized filesystem in /dev/sda9 Mar 17 18:42:41.678128 systemd[1]: Finished motdgen.service. Mar 17 18:42:41.690558 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:42:41.690632 systemd[1]: Reached target system-config.target. Mar 17 18:42:41.958451 mkfs.ext4[1237]: mke2fs 1.46.5 (30-Dec-2021) Mar 17 18:42:41.958451 mkfs.ext4[1237]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Mar 17 18:42:41.958451 mkfs.ext4[1237]: Creating filesystem with 262144 4k blocks and 65536 inodes Mar 17 18:42:41.958451 mkfs.ext4[1237]: Filesystem UUID: 4862db8c-c3a9-4ef0-a788-24799806cb31 Mar 17 18:42:41.958451 mkfs.ext4[1237]: Superblock backups stored on blocks: Mar 17 18:42:41.958451 mkfs.ext4[1237]: 32768, 98304, 163840, 229376 Mar 17 18:42:41.958451 mkfs.ext4[1237]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:42:41.958451 mkfs.ext4[1237]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:42:41.958451 mkfs.ext4[1237]: Creating journal (8192 blocks): done Mar 17 18:42:41.958451 mkfs.ext4[1237]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:42:41.959063 bash[1259]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:42:41.700672 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:42:41.700714 systemd[1]: Reached target user-config.target. Mar 17 18:42:41.720845 systemd[1]: Starting systemd-hostnamed.service... Mar 17 18:42:41.770134 systemd[1]: Started update-engine.service. Mar 17 18:42:41.960198 umount[1249]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Mar 17 18:42:41.795463 systemd[1]: Started locksmithd.service. Mar 17 18:42:41.862978 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:42:41.863313 systemd[1]: Finished extend-filesystems.service. Mar 17 18:42:41.880202 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:42:41.978128 systemd-logind[1212]: Watching system buttons on /dev/input/event1 (Power Button) Mar 17 18:42:41.978178 systemd-logind[1212]: Watching system buttons on /dev/input/event2 (Sleep Button) Mar 17 18:42:41.978209 systemd-logind[1212]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 18:42:41.979220 systemd-logind[1212]: New seat seat0. Mar 17 18:42:41.987833 systemd[1]: Started systemd-logind.service. Mar 17 18:42:41.999432 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:42:42.156659 coreos-metadata[1193]: Mar 17 18:42:42.156 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Mar 17 18:42:42.161011 coreos-metadata[1193]: Mar 17 18:42:42.160 INFO Fetch failed with 404: resource not found Mar 17 18:42:42.161011 coreos-metadata[1193]: Mar 17 18:42:42.160 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Mar 17 18:42:42.162298 coreos-metadata[1193]: Mar 17 18:42:42.162 INFO Fetch successful Mar 17 18:42:42.162298 coreos-metadata[1193]: Mar 17 18:42:42.162 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Mar 17 18:42:42.163196 coreos-metadata[1193]: Mar 17 18:42:42.163 INFO Fetch failed with 404: resource not found Mar 17 18:42:42.163196 coreos-metadata[1193]: Mar 17 18:42:42.163 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Mar 17 18:42:42.164004 coreos-metadata[1193]: Mar 17 18:42:42.163 INFO Fetch failed with 404: resource not found Mar 17 18:42:42.164004 coreos-metadata[1193]: Mar 17 18:42:42.163 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Mar 17 18:42:42.165290 coreos-metadata[1193]: Mar 17 18:42:42.164 INFO Fetch successful Mar 17 18:42:42.167359 unknown[1193]: wrote ssh authorized keys file for user: core Mar 17 18:42:42.205868 update-ssh-keys[1268]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:42:42.206583 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 18:42:42.213600 env[1222]: time="2025-03-17T18:42:42.213508201Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:42:42.213757 env[1222]: time="2025-03-17T18:42:42.213733022Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.231747820Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.231801116Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232142856Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232171298Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232190386Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232205308Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232322955Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.232679 env[1222]: time="2025-03-17T18:42:42.232626288Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:42.233427 env[1222]: time="2025-03-17T18:42:42.233369049Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:42.235987 env[1222]: time="2025-03-17T18:42:42.235947428Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:42:42.236246 env[1222]: time="2025-03-17T18:42:42.236219333Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:42:42.236448 env[1222]: time="2025-03-17T18:42:42.236371180Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:42:42.248533 env[1222]: time="2025-03-17T18:42:42.248477434Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:42:42.248786 env[1222]: time="2025-03-17T18:42:42.248759427Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:42:42.248900 env[1222]: time="2025-03-17T18:42:42.248878951Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:42:42.249044 env[1222]: time="2025-03-17T18:42:42.249024126Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249220 env[1222]: time="2025-03-17T18:42:42.249198172Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249335 env[1222]: time="2025-03-17T18:42:42.249314747Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249459 env[1222]: time="2025-03-17T18:42:42.249440092Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249578 env[1222]: time="2025-03-17T18:42:42.249556638Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249688 env[1222]: time="2025-03-17T18:42:42.249669187Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249810 env[1222]: time="2025-03-17T18:42:42.249786660Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.249925 env[1222]: time="2025-03-17T18:42:42.249897773Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.250017 env[1222]: time="2025-03-17T18:42:42.250000265Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:42:42.250269 env[1222]: time="2025-03-17T18:42:42.250244305Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:42:42.250739 env[1222]: time="2025-03-17T18:42:42.250709288Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:42:42.251483 env[1222]: time="2025-03-17T18:42:42.251452909Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:42:42.255540 env[1222]: time="2025-03-17T18:42:42.255486818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.257690 env[1222]: time="2025-03-17T18:42:42.257655245Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:42:42.257917 env[1222]: time="2025-03-17T18:42:42.257892701Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.258126 env[1222]: time="2025-03-17T18:42:42.258104930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.258634 env[1222]: time="2025-03-17T18:42:42.258604586Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.258768 env[1222]: time="2025-03-17T18:42:42.258744122Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.267590 env[1222]: time="2025-03-17T18:42:42.267491921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.267816 env[1222]: time="2025-03-17T18:42:42.267789500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.267973 env[1222]: time="2025-03-17T18:42:42.267950916Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.268096 env[1222]: time="2025-03-17T18:42:42.268078077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.268245 env[1222]: time="2025-03-17T18:42:42.268223242Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:42:42.268632 env[1222]: time="2025-03-17T18:42:42.268599337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.268799 env[1222]: time="2025-03-17T18:42:42.268779461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.268925 env[1222]: time="2025-03-17T18:42:42.268903198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.269057 env[1222]: time="2025-03-17T18:42:42.269036754Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:42:42.269176 env[1222]: time="2025-03-17T18:42:42.269154454Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:42:42.269294 env[1222]: time="2025-03-17T18:42:42.269273767Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:42:42.269442 env[1222]: time="2025-03-17T18:42:42.269420203Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:42:42.269611 env[1222]: time="2025-03-17T18:42:42.269582933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:42:42.270206 env[1222]: time="2025-03-17T18:42:42.270097275Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.270473627Z" level=info msg="Connect containerd service" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.270553214Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.272700476Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.272856445Z" level=info msg="Start subscribing containerd event" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.272926378Z" level=info msg="Start recovering state" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.273014398Z" level=info msg="Start event monitor" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.273035217Z" level=info msg="Start snapshots syncer" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.273048973Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:42:42.274246 env[1222]: time="2025-03-17T18:42:42.273060908Z" level=info msg="Start streaming server" Mar 17 18:42:42.286553 env[1222]: time="2025-03-17T18:42:42.286508677Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:42:42.287678 env[1222]: time="2025-03-17T18:42:42.287632490Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:42:42.288032 systemd[1]: Started containerd.service. Mar 17 18:42:42.302614 dbus-daemon[1194]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 17 18:42:42.302841 systemd[1]: Started systemd-hostnamed.service. Mar 17 18:42:42.304690 dbus-daemon[1194]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1239 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Mar 17 18:42:42.315389 systemd[1]: Starting polkit.service... Mar 17 18:42:42.332973 env[1222]: time="2025-03-17T18:42:42.332918507Z" level=info msg="containerd successfully booted in 0.413542s" Mar 17 18:42:42.423450 polkitd[1272]: Started polkitd version 121 Mar 17 18:42:42.455679 polkitd[1272]: Loading rules from directory /etc/polkit-1/rules.d Mar 17 18:42:42.457292 polkitd[1272]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 17 18:42:42.462458 polkitd[1272]: Finished loading, compiling and executing 2 rules Mar 17 18:42:42.464413 dbus-daemon[1194]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 17 18:42:42.464797 systemd[1]: Started polkit.service. Mar 17 18:42:42.465580 polkitd[1272]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 17 18:42:42.519783 systemd-hostnamed[1239]: Hostname set to (transient) Mar 17 18:42:42.523722 systemd-resolved[1155]: System hostname changed to 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal'. Mar 17 18:42:42.777674 tar[1219]: linux-amd64/LICENSE Mar 17 18:42:42.777674 tar[1219]: linux-amd64/README.md Mar 17 18:42:42.788712 systemd[1]: Finished prepare-helm.service. Mar 17 18:42:42.988725 systemd[1]: Created slice system-sshd.slice. Mar 17 18:42:43.907611 systemd[1]: Started kubelet.service. Mar 17 18:42:44.662544 locksmithd[1254]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:42:45.148071 kubelet[1286]: E0317 18:42:45.147958 1286 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:42:45.154329 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:42:45.154598 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:42:45.154963 systemd[1]: kubelet.service: Consumed 1.392s CPU time. Mar 17 18:42:46.494717 sshd_keygen[1217]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:42:46.546003 systemd[1]: Finished sshd-keygen.service. Mar 17 18:42:46.556984 systemd[1]: Starting issuegen.service... Mar 17 18:42:46.566645 systemd[1]: Started sshd@0-10.128.0.56:22-139.178.89.65:47690.service. Mar 17 18:42:46.583645 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:42:46.583919 systemd[1]: Finished issuegen.service. Mar 17 18:42:46.592920 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:42:46.606315 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:42:46.617302 systemd[1]: Started getty@tty1.service. Mar 17 18:42:46.627133 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:42:46.635964 systemd[1]: Reached target getty.target. Mar 17 18:42:46.919131 sshd[1303]: Accepted publickey for core from 139.178.89.65 port 47690 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:46.923971 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:46.944416 systemd[1]: Created slice user-500.slice. Mar 17 18:42:46.953659 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:42:46.965654 systemd-logind[1212]: New session 1 of user core. Mar 17 18:42:46.972065 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:42:46.982639 systemd[1]: Starting user@500.service... Mar 17 18:42:47.006165 (systemd)[1311]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:47.199960 systemd[1311]: Queued start job for default target default.target. Mar 17 18:42:47.201331 systemd[1311]: Reached target paths.target. Mar 17 18:42:47.201372 systemd[1311]: Reached target sockets.target. Mar 17 18:42:47.201422 systemd[1311]: Reached target timers.target. Mar 17 18:42:47.201452 systemd[1311]: Reached target basic.target. Mar 17 18:42:47.201612 systemd[1]: Started user@500.service. Mar 17 18:42:47.202500 systemd[1311]: Reached target default.target. Mar 17 18:42:47.202577 systemd[1311]: Startup finished in 183ms. Mar 17 18:42:47.210336 systemd[1]: Started session-1.scope. Mar 17 18:42:47.437633 systemd[1]: Started sshd@1-10.128.0.56:22-139.178.89.65:47696.service. Mar 17 18:42:47.778971 sshd[1320]: Accepted publickey for core from 139.178.89.65 port 47696 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:47.781212 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:47.789156 systemd[1]: Started session-2.scope. Mar 17 18:42:47.790540 systemd-logind[1212]: New session 2 of user core. Mar 17 18:42:47.998104 sshd[1320]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:48.002265 systemd[1]: sshd@1-10.128.0.56:22-139.178.89.65:47696.service: Deactivated successfully. Mar 17 18:42:48.003399 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 18:42:48.006036 systemd-logind[1212]: Session 2 logged out. Waiting for processes to exit. Mar 17 18:42:48.008090 systemd-logind[1212]: Removed session 2. Mar 17 18:42:48.040247 systemd[1]: Started sshd@2-10.128.0.56:22-139.178.89.65:47708.service. Mar 17 18:42:48.323216 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Mar 17 18:42:48.345689 sshd[1326]: Accepted publickey for core from 139.178.89.65 port 47708 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:48.347247 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:48.355710 systemd[1]: Started session-3.scope. Mar 17 18:42:48.357451 systemd-logind[1212]: New session 3 of user core. Mar 17 18:42:48.559469 sshd[1326]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:48.563866 systemd[1]: sshd@2-10.128.0.56:22-139.178.89.65:47708.service: Deactivated successfully. Mar 17 18:42:48.564913 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 18:42:48.565786 systemd-logind[1212]: Session 3 logged out. Waiting for processes to exit. Mar 17 18:42:48.567071 systemd-logind[1212]: Removed session 3. Mar 17 18:42:50.298459 kernel: loop2: detected capacity change from 0 to 2097152 Mar 17 18:42:50.319257 systemd-nspawn[1332]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Mar 17 18:42:50.319257 systemd-nspawn[1332]: Press ^] three times within 1s to kill container. Mar 17 18:42:50.332459 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:42:50.362961 systemd[1]: tmp-unifiedFxBoMA.mount: Deactivated successfully. Mar 17 18:42:50.427280 systemd[1]: Started oem-gce.service. Mar 17 18:42:50.435136 systemd[1]: Reached target multi-user.target. Mar 17 18:42:50.445812 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:42:50.458970 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:42:50.459162 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:42:50.468827 systemd[1]: Startup finished in 1.086s (kernel) + 7.786s (initrd) + 16.856s (userspace) = 25.729s. Mar 17 18:42:50.489860 systemd-nspawn[1332]: + '[' -e /etc/default/instance_configs.cfg.template ']' Mar 17 18:42:50.489860 systemd-nspawn[1332]: + echo -e '[InstanceSetup]\nset_host_keys = false' Mar 17 18:42:50.490193 systemd-nspawn[1332]: + /usr/bin/google_instance_setup Mar 17 18:42:51.148302 instance-setup[1338]: INFO Running google_set_multiqueue. Mar 17 18:42:51.169564 instance-setup[1338]: INFO Set channels for eth0 to 2. Mar 17 18:42:51.173647 instance-setup[1338]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Mar 17 18:42:51.175172 instance-setup[1338]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Mar 17 18:42:51.175684 instance-setup[1338]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Mar 17 18:42:51.177286 instance-setup[1338]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Mar 17 18:42:51.177703 instance-setup[1338]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Mar 17 18:42:51.179102 instance-setup[1338]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Mar 17 18:42:51.179585 instance-setup[1338]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Mar 17 18:42:51.181114 instance-setup[1338]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Mar 17 18:42:51.193493 instance-setup[1338]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Mar 17 18:42:51.193909 instance-setup[1338]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Mar 17 18:42:51.238439 systemd-nspawn[1332]: + /usr/bin/google_metadata_script_runner --script-type startup Mar 17 18:42:51.577592 startup-script[1369]: INFO Starting startup scripts. Mar 17 18:42:51.591886 startup-script[1369]: INFO No startup scripts found in metadata. Mar 17 18:42:51.592045 startup-script[1369]: INFO Finished running startup scripts. Mar 17 18:42:51.628186 systemd-nspawn[1332]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Mar 17 18:42:51.628186 systemd-nspawn[1332]: + daemon_pids=() Mar 17 18:42:51.628916 systemd-nspawn[1332]: + for d in accounts clock_skew network Mar 17 18:42:51.628916 systemd-nspawn[1332]: + daemon_pids+=($!) Mar 17 18:42:51.628916 systemd-nspawn[1332]: + for d in accounts clock_skew network Mar 17 18:42:51.628916 systemd-nspawn[1332]: + daemon_pids+=($!) Mar 17 18:42:51.628916 systemd-nspawn[1332]: + for d in accounts clock_skew network Mar 17 18:42:51.629174 systemd-nspawn[1332]: + daemon_pids+=($!) Mar 17 18:42:51.629253 systemd-nspawn[1332]: + NOTIFY_SOCKET=/run/systemd/notify Mar 17 18:42:51.629253 systemd-nspawn[1332]: + /usr/bin/systemd-notify --ready Mar 17 18:42:51.629799 systemd-nspawn[1332]: + /usr/bin/google_clock_skew_daemon Mar 17 18:42:51.629980 systemd-nspawn[1332]: + /usr/bin/google_network_daemon Mar 17 18:42:51.630433 systemd-nspawn[1332]: + /usr/bin/google_accounts_daemon Mar 17 18:42:51.696084 systemd-nspawn[1332]: + wait -n 36 37 38 Mar 17 18:42:52.256574 google-clock-skew[1373]: INFO Starting Google Clock Skew daemon. Mar 17 18:42:52.284269 google-clock-skew[1373]: INFO Clock drift token has changed: 0. Mar 17 18:42:52.298605 systemd-nspawn[1332]: hwclock: Cannot access the Hardware Clock via any known method. Mar 17 18:42:52.298605 systemd-nspawn[1332]: hwclock: Use the --verbose option to see the details of our search for an access method. Mar 17 18:42:52.299646 google-clock-skew[1373]: WARNING Failed to sync system time with hardware clock. Mar 17 18:42:52.349337 groupadd[1383]: group added to /etc/group: name=google-sudoers, GID=1000 Mar 17 18:42:52.353824 groupadd[1383]: group added to /etc/gshadow: name=google-sudoers Mar 17 18:42:52.359309 groupadd[1383]: new group: name=google-sudoers, GID=1000 Mar 17 18:42:52.376032 google-accounts[1372]: INFO Starting Google Accounts daemon. Mar 17 18:42:52.381619 google-networking[1374]: INFO Starting Google Networking daemon. Mar 17 18:42:52.409928 google-accounts[1372]: WARNING OS Login not installed. Mar 17 18:42:52.411321 google-accounts[1372]: INFO Creating a new user account for 0. Mar 17 18:42:52.417938 systemd-nspawn[1332]: useradd: invalid user name '0': use --badname to ignore Mar 17 18:42:52.418857 google-accounts[1372]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Mar 17 18:42:55.406088 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 18:42:55.406547 systemd[1]: Stopped kubelet.service. Mar 17 18:42:55.406645 systemd[1]: kubelet.service: Consumed 1.392s CPU time. Mar 17 18:42:55.409539 systemd[1]: Starting kubelet.service... Mar 17 18:42:55.685382 systemd[1]: Started kubelet.service. Mar 17 18:42:55.747288 kubelet[1398]: E0317 18:42:55.747225 1398 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:42:55.751570 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:42:55.751818 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:42:58.490841 systemd[1]: Started sshd@3-10.128.0.56:22-139.178.89.65:34104.service. Mar 17 18:42:58.780759 sshd[1406]: Accepted publickey for core from 139.178.89.65 port 34104 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:58.782457 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:58.789378 systemd-logind[1212]: New session 4 of user core. Mar 17 18:42:58.790173 systemd[1]: Started session-4.scope. Mar 17 18:42:58.993287 sshd[1406]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:58.997590 systemd[1]: sshd@3-10.128.0.56:22-139.178.89.65:34104.service: Deactivated successfully. Mar 17 18:42:58.998683 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:42:58.999588 systemd-logind[1212]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:42:59.000813 systemd-logind[1212]: Removed session 4. Mar 17 18:42:59.039032 systemd[1]: Started sshd@4-10.128.0.56:22-139.178.89.65:34120.service. Mar 17 18:42:59.329247 sshd[1412]: Accepted publickey for core from 139.178.89.65 port 34120 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:59.331033 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:59.337551 systemd-logind[1212]: New session 5 of user core. Mar 17 18:42:59.338233 systemd[1]: Started session-5.scope. Mar 17 18:42:59.536120 sshd[1412]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:59.540191 systemd[1]: sshd@4-10.128.0.56:22-139.178.89.65:34120.service: Deactivated successfully. Mar 17 18:42:59.541343 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:42:59.542307 systemd-logind[1212]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:42:59.543646 systemd-logind[1212]: Removed session 5. Mar 17 18:42:59.583331 systemd[1]: Started sshd@5-10.128.0.56:22-139.178.89.65:34136.service. Mar 17 18:42:59.879072 sshd[1418]: Accepted publickey for core from 139.178.89.65 port 34136 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:42:59.881259 sshd[1418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:59.888383 systemd[1]: Started session-6.scope. Mar 17 18:42:59.889265 systemd-logind[1212]: New session 6 of user core. Mar 17 18:43:00.095955 sshd[1418]: pam_unix(sshd:session): session closed for user core Mar 17 18:43:00.100254 systemd[1]: sshd@5-10.128.0.56:22-139.178.89.65:34136.service: Deactivated successfully. Mar 17 18:43:00.101341 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:43:00.102238 systemd-logind[1212]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:43:00.103552 systemd-logind[1212]: Removed session 6. Mar 17 18:43:00.140355 systemd[1]: Started sshd@6-10.128.0.56:22-139.178.89.65:34152.service. Mar 17 18:43:00.429978 sshd[1424]: Accepted publickey for core from 139.178.89.65 port 34152 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:43:00.431698 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:43:00.438831 systemd[1]: Started session-7.scope. Mar 17 18:43:00.439661 systemd-logind[1212]: New session 7 of user core. Mar 17 18:43:00.625378 sudo[1427]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:43:00.625956 sudo[1427]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:43:00.635734 dbus-daemon[1194]: \xd0M\xc7\u000f\x9aU: received setenforce notice (enforcing=9032576) Mar 17 18:43:00.637927 sudo[1427]: pam_unix(sudo:session): session closed for user root Mar 17 18:43:00.682322 sshd[1424]: pam_unix(sshd:session): session closed for user core Mar 17 18:43:00.687532 systemd[1]: sshd@6-10.128.0.56:22-139.178.89.65:34152.service: Deactivated successfully. Mar 17 18:43:00.688778 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:43:00.689771 systemd-logind[1212]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:43:00.691025 systemd-logind[1212]: Removed session 7. Mar 17 18:43:00.729776 systemd[1]: Started sshd@7-10.128.0.56:22-139.178.89.65:34154.service. Mar 17 18:43:01.025152 sshd[1431]: Accepted publickey for core from 139.178.89.65 port 34154 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:43:01.027474 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:43:01.034289 systemd[1]: Started session-8.scope. Mar 17 18:43:01.035128 systemd-logind[1212]: New session 8 of user core. Mar 17 18:43:01.204384 sudo[1435]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:43:01.204858 sudo[1435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:43:01.209201 sudo[1435]: pam_unix(sudo:session): session closed for user root Mar 17 18:43:01.221893 sudo[1434]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:43:01.222325 sudo[1434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:43:01.235380 systemd[1]: Stopping audit-rules.service... Mar 17 18:43:01.237000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:43:01.238629 auditctl[1438]: No rules Mar 17 18:43:01.242999 kernel: kauditd_printk_skb: 204 callbacks suppressed Mar 17 18:43:01.243125 kernel: audit: type=1305 audit(1742236981.237:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:43:01.243652 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:43:01.243925 systemd[1]: Stopped audit-rules.service. Mar 17 18:43:01.237000 audit[1438]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe01092140 a2=420 a3=0 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:01.258897 systemd[1]: Starting audit-rules.service... Mar 17 18:43:01.289166 kernel: audit: type=1300 audit(1742236981.237:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe01092140 a2=420 a3=0 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:01.290341 kernel: audit: type=1327 audit(1742236981.237:186): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:43:01.237000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:43:01.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.300995 augenrules[1455]: No rules Mar 17 18:43:01.302326 systemd[1]: Finished audit-rules.service. Mar 17 18:43:01.306033 sudo[1434]: pam_unix(sudo:session): session closed for user root Mar 17 18:43:01.321100 kernel: audit: type=1131 audit(1742236981.242:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.321262 kernel: audit: type=1130 audit(1742236981.301:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.304000 audit[1434]: USER_END pid=1434 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.368216 kernel: audit: type=1106 audit(1742236981.304:189): pid=1434 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.368369 kernel: audit: type=1104 audit(1742236981.304:190): pid=1434 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.304000 audit[1434]: CRED_DISP pid=1434 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.371570 sshd[1431]: pam_unix(sshd:session): session closed for user core Mar 17 18:43:01.376858 systemd-logind[1212]: Session 8 logged out. Waiting for processes to exit. Mar 17 18:43:01.379647 systemd[1]: sshd@7-10.128.0.56:22-139.178.89.65:34154.service: Deactivated successfully. Mar 17 18:43:01.380877 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 18:43:01.383098 systemd-logind[1212]: Removed session 8. Mar 17 18:43:01.423437 kernel: audit: type=1106 audit(1742236981.371:191): pid=1431 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.371000 audit[1431]: USER_END pid=1431 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.424615 systemd[1]: Started sshd@8-10.128.0.56:22-139.178.89.65:42866.service. Mar 17 18:43:01.372000 audit[1431]: CRED_DISP pid=1431 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.56:22-139.178.89.65:34154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.475003 kernel: audit: type=1104 audit(1742236981.372:192): pid=1431 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.475154 kernel: audit: type=1131 audit(1742236981.378:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.56:22-139.178.89.65:34154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.56:22-139.178.89.65:42866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.718000 audit[1461]: USER_ACCT pid=1461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.720062 sshd[1461]: Accepted publickey for core from 139.178.89.65 port 42866 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:43:01.720000 audit[1461]: CRED_ACQ pid=1461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.720000 audit[1461]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe62ef3fe0 a2=3 a3=0 items=0 ppid=1 pid=1461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:01.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:43:01.721194 sshd[1461]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:43:01.728065 systemd[1]: Started session-9.scope. Mar 17 18:43:01.728725 systemd-logind[1212]: New session 9 of user core. Mar 17 18:43:01.736000 audit[1461]: USER_START pid=1461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.738000 audit[1463]: CRED_ACQ pid=1463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:01.893000 audit[1464]: USER_ACCT pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.894882 sudo[1464]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:43:01.893000 audit[1464]: CRED_REFR pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.895361 sudo[1464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:43:01.896000 audit[1464]: USER_START pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:01.928895 systemd[1]: Starting docker.service... Mar 17 18:43:01.979486 env[1474]: time="2025-03-17T18:43:01.978225295Z" level=info msg="Starting up" Mar 17 18:43:01.980436 env[1474]: time="2025-03-17T18:43:01.980368971Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 18:43:01.980436 env[1474]: time="2025-03-17T18:43:01.980415738Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 18:43:01.980611 env[1474]: time="2025-03-17T18:43:01.980448281Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 18:43:01.980611 env[1474]: time="2025-03-17T18:43:01.980475931Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 18:43:01.983217 env[1474]: time="2025-03-17T18:43:01.983180082Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 18:43:01.983338 env[1474]: time="2025-03-17T18:43:01.983220544Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 18:43:01.983338 env[1474]: time="2025-03-17T18:43:01.983244110Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 18:43:01.983338 env[1474]: time="2025-03-17T18:43:01.983260129Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 18:43:02.042607 env[1474]: time="2025-03-17T18:43:02.042545047Z" level=info msg="Loading containers: start." Mar 17 18:43:02.128000 audit[1506]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.128000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffce6bbb610 a2=0 a3=7ffce6bbb5fc items=0 ppid=1474 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Mar 17 18:43:02.131000 audit[1508]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.131000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe9a72fdb0 a2=0 a3=7ffe9a72fd9c items=0 ppid=1474 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Mar 17 18:43:02.134000 audit[1510]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.134000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5c35f2f0 a2=0 a3=7fff5c35f2dc items=0 ppid=1474 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 18:43:02.138000 audit[1512]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.138000 audit[1512]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe7200f1f0 a2=0 a3=7ffe7200f1dc items=0 ppid=1474 pid=1512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 18:43:02.142000 audit[1514]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.142000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd54f49190 a2=0 a3=7ffd54f4917c items=0 ppid=1474 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Mar 17 18:43:02.164000 audit[1519]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.164000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffefb398c90 a2=0 a3=7ffefb398c7c items=0 ppid=1474 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Mar 17 18:43:02.176000 audit[1521]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.176000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffc1938270 a2=0 a3=7fffc193825c items=0 ppid=1474 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Mar 17 18:43:02.179000 audit[1523]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1523 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.179000 audit[1523]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd20b09470 a2=0 a3=7ffd20b0945c items=0 ppid=1474 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Mar 17 18:43:02.183000 audit[1525]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.183000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc5cdc62f0 a2=0 a3=7ffc5cdc62dc items=0 ppid=1474 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:43:02.196000 audit[1529]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.196000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffedd00d4b0 a2=0 a3=7ffedd00d49c items=0 ppid=1474 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:43:02.201000 audit[1530]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.201000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffedc71830 a2=0 a3=7fffedc7181c items=0 ppid=1474 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.201000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:43:02.220466 kernel: Initializing XFRM netlink socket Mar 17 18:43:02.269487 env[1474]: time="2025-03-17T18:43:02.266804148Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 17 18:43:02.304000 audit[1538]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.304000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffee5b07e50 a2=0 a3=7ffee5b07e3c items=0 ppid=1474 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Mar 17 18:43:02.317000 audit[1541]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.317000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe3ca7a970 a2=0 a3=7ffe3ca7a95c items=0 ppid=1474 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Mar 17 18:43:02.321000 audit[1544]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.321000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff4a1687e0 a2=0 a3=7fff4a1687cc items=0 ppid=1474 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Mar 17 18:43:02.324000 audit[1546]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.324000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdd5876e70 a2=0 a3=7ffdd5876e5c items=0 ppid=1474 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Mar 17 18:43:02.328000 audit[1548]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.328000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffeb274270 a2=0 a3=7fffeb27425c items=0 ppid=1474 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Mar 17 18:43:02.331000 audit[1550]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.331000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffda8ff620 a2=0 a3=7fffda8ff60c items=0 ppid=1474 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Mar 17 18:43:02.334000 audit[1552]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.334000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc1c9acf30 a2=0 a3=7ffc1c9acf1c items=0 ppid=1474 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Mar 17 18:43:02.348000 audit[1555]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.348000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcedd24130 a2=0 a3=7ffcedd2411c items=0 ppid=1474 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Mar 17 18:43:02.352000 audit[1557]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.352000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd82bf9240 a2=0 a3=7ffd82bf922c items=0 ppid=1474 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 18:43:02.356000 audit[1559]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.356000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff383d2c00 a2=0 a3=7fff383d2bec items=0 ppid=1474 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 18:43:02.359000 audit[1561]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.359000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff92ed4b10 a2=0 a3=7fff92ed4afc items=0 ppid=1474 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Mar 17 18:43:02.360224 systemd-networkd[1027]: docker0: Link UP Mar 17 18:43:02.374000 audit[1565]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.374000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff4d88990 a2=0 a3=7ffff4d8897c items=0 ppid=1474 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.374000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:43:02.379000 audit[1566]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:02.379000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd993e0100 a2=0 a3=7ffd993e00ec items=0 ppid=1474 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:02.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:43:02.380513 env[1474]: time="2025-03-17T18:43:02.380450079Z" level=info msg="Loading containers: done." Mar 17 18:43:02.404616 env[1474]: time="2025-03-17T18:43:02.404564147Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Mar 17 18:43:02.404879 env[1474]: time="2025-03-17T18:43:02.404860666Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Mar 17 18:43:02.405060 env[1474]: time="2025-03-17T18:43:02.405015811Z" level=info msg="Daemon has completed initialization" Mar 17 18:43:02.425549 systemd[1]: Started docker.service. Mar 17 18:43:02.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:02.438378 env[1474]: time="2025-03-17T18:43:02.438113669Z" level=info msg="API listen on /run/docker.sock" Mar 17 18:43:03.496380 env[1222]: time="2025-03-17T18:43:03.496306960Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.7\"" Mar 17 18:43:03.994615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3763147322.mount: Deactivated successfully. Mar 17 18:43:05.720772 env[1222]: time="2025-03-17T18:43:05.720692821Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:05.723808 env[1222]: time="2025-03-17T18:43:05.723758097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f084bc047a8cf7c8484d47c51e70e646dde3977d916f282feb99207b7b9241af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:05.726421 env[1222]: time="2025-03-17T18:43:05.726363423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:05.728689 env[1222]: time="2025-03-17T18:43:05.728644396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:22c19cc70fe5806d0a2cb28a6b6b33fd34e6f9e50616bdf6d53649bcfafbc277,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:05.729729 env[1222]: time="2025-03-17T18:43:05.729676544Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.7\" returns image reference \"sha256:f084bc047a8cf7c8484d47c51e70e646dde3977d916f282feb99207b7b9241af\"" Mar 17 18:43:05.732651 env[1222]: time="2025-03-17T18:43:05.732616709Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.7\"" Mar 17 18:43:06.003058 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 18:43:06.003389 systemd[1]: Stopped kubelet.service. Mar 17 18:43:06.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:06.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:06.005840 systemd[1]: Starting kubelet.service... Mar 17 18:43:06.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:06.200062 systemd[1]: Started kubelet.service. Mar 17 18:43:06.292533 kubelet[1604]: E0317 18:43:06.292358 1604 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:43:06.294863 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:43:06.295091 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:43:06.301153 kernel: kauditd_printk_skb: 87 callbacks suppressed Mar 17 18:43:06.301361 kernel: audit: type=1131 audit(1742236986.295:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:43:06.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:43:07.339544 env[1222]: time="2025-03-17T18:43:07.339489196Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.342648 env[1222]: time="2025-03-17T18:43:07.342575041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:652dcad615a9a0c252c253860d5b5b7bfebd3efe159dc033a8555bc15a6d1985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.345437 env[1222]: time="2025-03-17T18:43:07.345378974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.348225 env[1222]: time="2025-03-17T18:43:07.348184123Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6abe7a0accecf29db6ebab18a10f844678ffed693d79e2e51a18a6f2b4530cbb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.349556 env[1222]: time="2025-03-17T18:43:07.349509370Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.7\" returns image reference \"sha256:652dcad615a9a0c252c253860d5b5b7bfebd3efe159dc033a8555bc15a6d1985\"" Mar 17 18:43:07.350478 env[1222]: time="2025-03-17T18:43:07.350445235Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.7\"" Mar 17 18:43:08.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.56:22-212.252.73.82:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:08.505047 systemd[1]: Started sshd@9-10.128.0.56:22-212.252.73.82:42076.service. Mar 17 18:43:08.530440 kernel: audit: type=1130 audit(1742236988.503:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.56:22-212.252.73.82:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:08.665599 env[1222]: time="2025-03-17T18:43:08.665521890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:08.668365 env[1222]: time="2025-03-17T18:43:08.668313676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f1f6a63d8aa14cf61d0045e912ad312b4ade24637cecccc933b163582eae68c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:08.670831 env[1222]: time="2025-03-17T18:43:08.670782632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:08.673337 env[1222]: time="2025-03-17T18:43:08.673291386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:fb80249bcb77ee72b1c9fa5b70bc28a83ed107c9ca71957841ad91db379963bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:08.674557 env[1222]: time="2025-03-17T18:43:08.674502156Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.7\" returns image reference \"sha256:7f1f6a63d8aa14cf61d0045e912ad312b4ade24637cecccc933b163582eae68c\"" Mar 17 18:43:08.675547 env[1222]: time="2025-03-17T18:43:08.675512468Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\"" Mar 17 18:43:09.861972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3372321970.mount: Deactivated successfully. Mar 17 18:43:10.633684 env[1222]: time="2025-03-17T18:43:10.633609013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:10.636435 env[1222]: time="2025-03-17T18:43:10.636347257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:10.638597 env[1222]: time="2025-03-17T18:43:10.638553336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:10.640755 env[1222]: time="2025-03-17T18:43:10.640708593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:e5839270c96c3ad1bea1dce4935126d3281297527f3655408d2970aa4b5cf178,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:10.641370 env[1222]: time="2025-03-17T18:43:10.641311406Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\" returns image reference \"sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1\"" Mar 17 18:43:10.642359 env[1222]: time="2025-03-17T18:43:10.642310250Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Mar 17 18:43:11.054375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3983619793.mount: Deactivated successfully. Mar 17 18:43:12.084158 sshd[1611]: kex_exchange_identification: banner line contains invalid characters Mar 17 18:43:12.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.56:22-212.252.73.82:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:12.087176 sshd[1611]: banner exchange: Connection from 212.252.73.82 port 42076: invalid format Mar 17 18:43:12.085170 systemd[1]: sshd@9-10.128.0.56:22-212.252.73.82:42076.service: Deactivated successfully. Mar 17 18:43:12.110456 kernel: audit: type=1131 audit(1742236992.084:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.56:22-212.252.73.82:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:12.203962 env[1222]: time="2025-03-17T18:43:12.203884754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.207141 env[1222]: time="2025-03-17T18:43:12.207081546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.209972 env[1222]: time="2025-03-17T18:43:12.209918885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.212525 env[1222]: time="2025-03-17T18:43:12.212474966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.213638 env[1222]: time="2025-03-17T18:43:12.213589957Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Mar 17 18:43:12.214322 env[1222]: time="2025-03-17T18:43:12.214288968Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Mar 17 18:43:12.552648 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 17 18:43:12.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:12.576640 kernel: audit: type=1131 audit(1742236992.552:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:12.599000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:43:12.599000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:43:12.615537 kernel: audit: type=1334 audit(1742236992.599:235): prog-id=40 op=UNLOAD Mar 17 18:43:12.615699 kernel: audit: type=1334 audit(1742236992.599:236): prog-id=39 op=UNLOAD Mar 17 18:43:12.615745 kernel: audit: type=1334 audit(1742236992.599:237): prog-id=38 op=UNLOAD Mar 17 18:43:12.599000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:43:12.673397 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3922857666.mount: Deactivated successfully. Mar 17 18:43:12.679993 env[1222]: time="2025-03-17T18:43:12.679780641Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.683006 env[1222]: time="2025-03-17T18:43:12.682959283Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.685471 env[1222]: time="2025-03-17T18:43:12.685398321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.687799 env[1222]: time="2025-03-17T18:43:12.687731433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:12.688800 env[1222]: time="2025-03-17T18:43:12.688751605Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Mar 17 18:43:12.689732 env[1222]: time="2025-03-17T18:43:12.689701405Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Mar 17 18:43:13.128434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount224978786.mount: Deactivated successfully. Mar 17 18:43:15.743985 env[1222]: time="2025-03-17T18:43:15.743906017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:15.747327 env[1222]: time="2025-03-17T18:43:15.747269646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:15.750892 env[1222]: time="2025-03-17T18:43:15.750838075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:15.754902 env[1222]: time="2025-03-17T18:43:15.754852076Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:15.756607 env[1222]: time="2025-03-17T18:43:15.756542894Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Mar 17 18:43:16.546528 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 18:43:16.546852 systemd[1]: Stopped kubelet.service. Mar 17 18:43:16.570042 kernel: audit: type=1130 audit(1742236996.546:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.549378 systemd[1]: Starting kubelet.service... Mar 17 18:43:16.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.609447 kernel: audit: type=1131 audit(1742236996.546:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.809943 systemd[1]: Started kubelet.service. Mar 17 18:43:16.833485 kernel: audit: type=1130 audit(1742236996.810:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.918262 systemd[1]: Started sshd@10-10.128.0.56:22-212.252.73.82:43201.service. Mar 17 18:43:16.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.56:22-212.252.73.82:43201 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.940242 kubelet[1635]: E0317 18:43:16.940186 1635 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:43:16.943287 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:43:16.945317 kernel: audit: type=1130 audit(1742236996.918:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.56:22-212.252.73.82:43201 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:16.943537 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:43:16.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:43:16.969456 kernel: audit: type=1131 audit(1742236996.943:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:43:17.315868 sshd[1642]: kex_exchange_identification: read: Connection reset by peer Mar 17 18:43:17.315868 sshd[1642]: Connection reset by 212.252.73.82 port 43201 Mar 17 18:43:17.316703 systemd[1]: sshd@10-10.128.0.56:22-212.252.73.82:43201.service: Deactivated successfully. Mar 17 18:43:17.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.56:22-212.252.73.82:43201 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:17.342461 kernel: audit: type=1131 audit(1742236997.315:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.56:22-212.252.73.82:43201 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:19.698614 systemd[1]: Stopped kubelet.service. Mar 17 18:43:19.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:19.721473 kernel: audit: type=1130 audit(1742236999.697:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:19.706135 systemd[1]: Starting kubelet.service... Mar 17 18:43:19.760497 kernel: audit: type=1131 audit(1742236999.697:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:19.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:19.788624 systemd[1]: Reloading. Mar 17 18:43:19.939719 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2025-03-17T18:43:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:43:19.939769 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2025-03-17T18:43:19Z" level=info msg="torcx already run" Mar 17 18:43:20.037974 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:43:20.038000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:43:20.062421 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:43:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.193010 kernel: audit: type=1400 audit(1742237000.150:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.193148 kernel: audit: type=1400 audit(1742237000.150:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.193192 kernel: audit: type=1400 audit(1742237000.156:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.234540 kernel: audit: type=1400 audit(1742237000.156:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.234705 kernel: audit: type=1400 audit(1742237000.156:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.276058 kernel: audit: type=1400 audit(1742237000.156:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.276212 kernel: audit: type=1400 audit(1742237000.156:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit: BPF prog-id=43 op=LOAD Mar 17 18:43:20.191000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit: BPF prog-id=44 op=LOAD Mar 17 18:43:20.212000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit: BPF prog-id=45 op=LOAD Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.295000 audit: BPF prog-id=46 op=LOAD Mar 17 18:43:20.295000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:43:20.295000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit: BPF prog-id=47 op=LOAD Mar 17 18:43:20.301000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit: BPF prog-id=48 op=LOAD Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.301000 audit: BPF prog-id=49 op=LOAD Mar 17 18:43:20.301000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:43:20.301000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.303000 audit: BPF prog-id=50 op=LOAD Mar 17 18:43:20.303000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit: BPF prog-id=51 op=LOAD Mar 17 18:43:20.306000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.307000 audit: BPF prog-id=52 op=LOAD Mar 17 18:43:20.307000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit: BPF prog-id=53 op=LOAD Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.308000 audit: BPF prog-id=54 op=LOAD Mar 17 18:43:20.308000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:43:20.308000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit: BPF prog-id=55 op=LOAD Mar 17 18:43:20.336000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit: BPF prog-id=56 op=LOAD Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:20.336000 audit: BPF prog-id=57 op=LOAD Mar 17 18:43:20.336000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:43:20.336000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:43:20.362244 systemd[1]: Started kubelet.service. Mar 17 18:43:20.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:20.366375 systemd[1]: Stopping kubelet.service... Mar 17 18:43:20.367057 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:43:20.367364 systemd[1]: Stopped kubelet.service. Mar 17 18:43:20.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:20.369836 systemd[1]: Starting kubelet.service... Mar 17 18:43:20.588084 systemd[1]: Started kubelet.service. Mar 17 18:43:20.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:20.659705 kubelet[1721]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:43:20.660222 kubelet[1721]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:43:20.660311 kubelet[1721]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:43:20.660616 kubelet[1721]: I0317 18:43:20.660487 1721 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:43:20.993246 kubelet[1721]: I0317 18:43:20.993176 1721 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 18:43:20.993246 kubelet[1721]: I0317 18:43:20.993222 1721 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:43:20.993680 kubelet[1721]: I0317 18:43:20.993636 1721 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 18:43:21.042883 kubelet[1721]: E0317 18:43:21.042828 1721 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.128.0.56:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:21.043125 kubelet[1721]: I0317 18:43:21.042848 1721 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:43:21.058854 kubelet[1721]: E0317 18:43:21.058795 1721 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:43:21.058854 kubelet[1721]: I0317 18:43:21.058852 1721 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:43:21.065770 kubelet[1721]: I0317 18:43:21.065731 1721 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:43:21.065984 kubelet[1721]: I0317 18:43:21.065922 1721 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 18:43:21.066208 kubelet[1721]: I0317 18:43:21.066143 1721 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:43:21.066544 kubelet[1721]: I0317 18:43:21.066192 1721 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:43:21.066766 kubelet[1721]: I0317 18:43:21.066548 1721 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:43:21.066766 kubelet[1721]: I0317 18:43:21.066569 1721 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 18:43:21.066766 kubelet[1721]: I0317 18:43:21.066715 1721 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:43:21.072635 kubelet[1721]: I0317 18:43:21.072581 1721 kubelet.go:408] "Attempting to sync node with API server" Mar 17 18:43:21.072635 kubelet[1721]: I0317 18:43:21.072628 1721 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:43:21.078980 kubelet[1721]: I0317 18:43:21.078921 1721 kubelet.go:314] "Adding apiserver pod source" Mar 17 18:43:21.078980 kubelet[1721]: I0317 18:43:21.078975 1721 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:43:21.097361 kubelet[1721]: W0317 18:43:21.097254 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.56:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:21.097361 kubelet[1721]: E0317 18:43:21.097349 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.56:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:21.101969 kubelet[1721]: W0317 18:43:21.101897 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.56:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:21.102245 kubelet[1721]: E0317 18:43:21.102190 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.56:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:21.102421 kubelet[1721]: I0317 18:43:21.102375 1721 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:43:21.112737 kubelet[1721]: I0317 18:43:21.112682 1721 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:43:21.112924 kubelet[1721]: W0317 18:43:21.112779 1721 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:43:21.114199 kubelet[1721]: I0317 18:43:21.113923 1721 server.go:1269] "Started kubelet" Mar 17 18:43:21.114832 kubelet[1721]: I0317 18:43:21.114772 1721 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:43:21.116286 kubelet[1721]: I0317 18:43:21.116125 1721 server.go:460] "Adding debug handlers to kubelet server" Mar 17 18:43:21.118000 audit[1721]: AVC avc: denied { mac_admin } for pid=1721 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:21.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:21.118000 audit[1721]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000982cf0 a1=c000839dd0 a2=c000982cc0 a3=25 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:21.118000 audit[1721]: AVC avc: denied { mac_admin } for pid=1721 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:21.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:21.118000 audit[1721]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000986460 a1=c000839de8 a2=c000982d80 a3=25 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:21.119880 kubelet[1721]: I0317 18:43:21.119023 1721 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:43:21.119880 kubelet[1721]: I0317 18:43:21.119119 1721 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:43:21.119880 kubelet[1721]: I0317 18:43:21.119210 1721 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:43:21.121373 kubelet[1721]: I0317 18:43:21.121308 1721 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:43:21.121791 kubelet[1721]: I0317 18:43:21.121768 1721 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:43:21.123000 audit[1732]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.123000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff47627f30 a2=0 a3=7fff47627f1c items=0 ppid=1721 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:43:21.125000 audit[1733]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.125000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4b1ce640 a2=0 a3=7ffe4b1ce62c items=0 ppid=1721 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:43:21.126701 kubelet[1721]: E0317 18:43:21.123875 1721 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.56:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.56:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal.182dab525def60cb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,UID:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,},FirstTimestamp:2025-03-17 18:43:21.113886923 +0000 UTC m=+0.516828292,LastTimestamp:2025-03-17 18:43:21.113886923 +0000 UTC m=+0.516828292,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,}" Mar 17 18:43:21.128194 kubelet[1721]: I0317 18:43:21.128143 1721 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:43:21.128963 kubelet[1721]: E0317 18:43:21.128937 1721 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" not found" Mar 17 18:43:21.129160 kubelet[1721]: I0317 18:43:21.129142 1721 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 18:43:21.129559 kubelet[1721]: I0317 18:43:21.129538 1721 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 18:43:21.129763 kubelet[1721]: I0317 18:43:21.129748 1721 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:43:21.130431 kubelet[1721]: W0317 18:43:21.130351 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.56:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:21.130613 kubelet[1721]: E0317 18:43:21.130583 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.56:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:21.131086 kubelet[1721]: I0317 18:43:21.131063 1721 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:43:21.131316 kubelet[1721]: I0317 18:43:21.131294 1721 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:43:21.132853 kubelet[1721]: E0317 18:43:21.132814 1721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.56:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.56:6443: connect: connection refused" interval="200ms" Mar 17 18:43:21.133225 kubelet[1721]: E0317 18:43:21.133201 1721 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:43:21.133672 kubelet[1721]: I0317 18:43:21.133649 1721 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:43:21.136000 audit[1735]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.136000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffced16d040 a2=0 a3=7ffced16d02c items=0 ppid=1721 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:43:21.140000 audit[1737]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.140000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf40a26e0 a2=0 a3=7ffdf40a26cc items=0 ppid=1721 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:43:21.164000 audit[1743]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.164000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe41e17e50 a2=0 a3=7ffe41e17e3c items=0 ppid=1721 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:43:21.165169 kubelet[1721]: I0317 18:43:21.164993 1721 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:43:21.165000 audit[1744]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:21.165000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff907f0fe0 a2=0 a3=7fff907f0fcc items=0 ppid=1721 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:43:21.166930 kubelet[1721]: I0317 18:43:21.166884 1721 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:43:21.166930 kubelet[1721]: I0317 18:43:21.166916 1721 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:43:21.167100 kubelet[1721]: I0317 18:43:21.166941 1721 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 18:43:21.167100 kubelet[1721]: E0317 18:43:21.167024 1721 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 18:43:21.168000 audit[1745]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.168000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc520cc2f0 a2=0 a3=7ffc520cc2dc items=0 ppid=1721 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:43:21.170000 audit[1746]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.170000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce1495060 a2=0 a3=7ffce149504c items=0 ppid=1721 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:43:21.171000 audit[1747]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:21.171000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff94f70d0 a2=0 a3=7ffff94f70bc items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:43:21.172000 audit[1748]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:21.172000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc125fd9e0 a2=0 a3=7ffc125fd9cc items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:43:21.173000 audit[1749]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:21.173000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcf71c09a0 a2=0 a3=7ffcf71c098c items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:43:21.175312 kubelet[1721]: W0317 18:43:21.175215 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.56:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:21.175467 kubelet[1721]: E0317 18:43:21.175303 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.56:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:21.177023 kubelet[1721]: I0317 18:43:21.176978 1721 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:43:21.177023 kubelet[1721]: I0317 18:43:21.177000 1721 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:43:21.177023 kubelet[1721]: I0317 18:43:21.177026 1721 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:43:21.177000 audit[1750]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:21.177000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd524da650 a2=0 a3=7ffd524da63c items=0 ppid=1721 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:43:21.179498 kubelet[1721]: I0317 18:43:21.179441 1721 policy_none.go:49] "None policy: Start" Mar 17 18:43:21.180266 kubelet[1721]: I0317 18:43:21.180247 1721 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:43:21.180470 kubelet[1721]: I0317 18:43:21.180456 1721 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:43:21.187651 systemd[1]: Created slice kubepods.slice. Mar 17 18:43:21.194535 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:43:21.198964 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:43:21.206542 kubelet[1721]: I0317 18:43:21.206512 1721 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:43:21.206000 audit[1721]: AVC avc: denied { mac_admin } for pid=1721 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:21.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:21.206000 audit[1721]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004e2570 a1=c0005958c0 a2=c0004e24b0 a3=25 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:21.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:21.207129 kubelet[1721]: I0317 18:43:21.206781 1721 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:43:21.207129 kubelet[1721]: I0317 18:43:21.207113 1721 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:43:21.207323 kubelet[1721]: I0317 18:43:21.207136 1721 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:43:21.209661 kubelet[1721]: I0317 18:43:21.209582 1721 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:43:21.211860 kubelet[1721]: E0317 18:43:21.211694 1721 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" not found" Mar 17 18:43:21.302493 systemd[1]: Created slice kubepods-burstable-pod841bf4b08d8df8d4fdc8734abd74fbe0.slice. Mar 17 18:43:21.312383 kubelet[1721]: I0317 18:43:21.312334 1721 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.312831 kubelet[1721]: E0317 18:43:21.312795 1721 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.56:6443/api/v1/nodes\": dial tcp 10.128.0.56:6443: connect: connection refused" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.324084 systemd[1]: Created slice kubepods-burstable-pod9e5d63d4ec72d7209214d06dc2921dad.slice. Mar 17 18:43:21.335743 systemd[1]: Created slice kubepods-burstable-podbb27a09ae6978456be966a1bcacff26b.slice. Mar 17 18:43:21.337184 kubelet[1721]: E0317 18:43:21.337133 1721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.56:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.56:6443: connect: connection refused" interval="400ms" Mar 17 18:43:21.431111 kubelet[1721]: I0317 18:43:21.431036 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431111 kubelet[1721]: I0317 18:43:21.431104 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431368 kubelet[1721]: I0317 18:43:21.431140 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431368 kubelet[1721]: I0317 18:43:21.431168 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bb27a09ae6978456be966a1bcacff26b-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"bb27a09ae6978456be966a1bcacff26b\") " pod="kube-system/kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431368 kubelet[1721]: I0317 18:43:21.431194 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431368 kubelet[1721]: I0317 18:43:21.431319 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431692 kubelet[1721]: I0317 18:43:21.431356 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431692 kubelet[1721]: I0317 18:43:21.431396 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.431692 kubelet[1721]: I0317 18:43:21.431571 1721 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.517872 kubelet[1721]: I0317 18:43:21.517826 1721 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.518315 kubelet[1721]: E0317 18:43:21.518257 1721 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.56:6443/api/v1/nodes\": dial tcp 10.128.0.56:6443: connect: connection refused" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.624109 env[1222]: time="2025-03-17T18:43:21.623947132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:841bf4b08d8df8d4fdc8734abd74fbe0,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:21.628847 env[1222]: time="2025-03-17T18:43:21.628785856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:9e5d63d4ec72d7209214d06dc2921dad,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:21.640080 env[1222]: time="2025-03-17T18:43:21.640026575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:bb27a09ae6978456be966a1bcacff26b,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:21.739677 kubelet[1721]: E0317 18:43:21.739614 1721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.56:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.56:6443: connect: connection refused" interval="800ms" Mar 17 18:43:21.923514 kubelet[1721]: I0317 18:43:21.922767 1721 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.923514 kubelet[1721]: E0317 18:43:21.923205 1721 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.56:6443/api/v1/nodes\": dial tcp 10.128.0.56:6443: connect: connection refused" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:21.987157 kubelet[1721]: W0317 18:43:21.987011 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.56:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:21.987157 kubelet[1721]: E0317 18:43:21.987107 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.56:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:22.001362 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount821919705.mount: Deactivated successfully. Mar 17 18:43:22.011905 env[1222]: time="2025-03-17T18:43:22.011834066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.017101 env[1222]: time="2025-03-17T18:43:22.017030225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.019823 env[1222]: time="2025-03-17T18:43:22.019771002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.021171 env[1222]: time="2025-03-17T18:43:22.021118708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.022106 env[1222]: time="2025-03-17T18:43:22.022050170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.023518 env[1222]: time="2025-03-17T18:43:22.023377810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.026651 env[1222]: time="2025-03-17T18:43:22.026598133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.027846 env[1222]: time="2025-03-17T18:43:22.027789730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.029250 env[1222]: time="2025-03-17T18:43:22.029195732Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.032124 env[1222]: time="2025-03-17T18:43:22.032081141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.034265 env[1222]: time="2025-03-17T18:43:22.034199578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.037990 env[1222]: time="2025-03-17T18:43:22.037947717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.074242 kubelet[1721]: W0317 18:43:22.074110 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.56:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:22.074473 kubelet[1721]: E0317 18:43:22.074297 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.56:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:22.084001 env[1222]: time="2025-03-17T18:43:22.083905761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:22.084159 env[1222]: time="2025-03-17T18:43:22.084029447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:22.084159 env[1222]: time="2025-03-17T18:43:22.084073566Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:22.085933 env[1222]: time="2025-03-17T18:43:22.085798700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62a38c8f1262f9d19bf57f4f5e943ecf3612312d4ecd379c9a917124145df788 pid=1758 runtime=io.containerd.runc.v2 Mar 17 18:43:22.095332 env[1222]: time="2025-03-17T18:43:22.095241645Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:22.095536 env[1222]: time="2025-03-17T18:43:22.095349867Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:22.095536 env[1222]: time="2025-03-17T18:43:22.095390174Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:22.095656 env[1222]: time="2025-03-17T18:43:22.095607983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60db4135a5d1df680922dc79483aa6ec60b9f5c5655b147510352017ed72348c pid=1777 runtime=io.containerd.runc.v2 Mar 17 18:43:22.118226 systemd[1]: Started cri-containerd-62a38c8f1262f9d19bf57f4f5e943ecf3612312d4ecd379c9a917124145df788.scope. Mar 17 18:43:22.122472 kubelet[1721]: W0317 18:43:22.121320 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.56:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:22.122472 kubelet[1721]: E0317 18:43:22.121444 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.56:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:22.138651 env[1222]: time="2025-03-17T18:43:22.132026465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:22.138651 env[1222]: time="2025-03-17T18:43:22.132088723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:22.138651 env[1222]: time="2025-03-17T18:43:22.132108944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:22.139734 env[1222]: time="2025-03-17T18:43:22.139637511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e9db12362334587fc19b422d356b2cc798a5e6d0ec55188539b4776c7ea7b7b pid=1800 runtime=io.containerd.runc.v2 Mar 17 18:43:22.152741 systemd[1]: Started cri-containerd-60db4135a5d1df680922dc79483aa6ec60b9f5c5655b147510352017ed72348c.scope. Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.160000 audit: BPF prog-id=58 op=LOAD Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613338633866313236326639643139626635376634663565393433 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613338633866313236326639643139626635376634663565393433 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit: BPF prog-id=59 op=LOAD Mar 17 18:43:22.161000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039c860 items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613338633866313236326639643139626635376634663565393433 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.161000 audit: BPF prog-id=60 op=LOAD Mar 17 18:43:22.161000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039c8a8 items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613338633866313236326639643139626635376634663565393433 Mar 17 18:43:22.161000 audit: BPF prog-id=60 op=UNLOAD Mar 17 18:43:22.161000 audit: BPF prog-id=59 op=UNLOAD Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.162000 audit: BPF prog-id=61 op=LOAD Mar 17 18:43:22.162000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039ccb8 items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613338633866313236326639643139626635376634663565393433 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.180000 audit: BPF prog-id=62 op=LOAD Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1777 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646234313335613564316466363830393232646337393438336161 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1777 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646234313335613564316466363830393232646337393438336161 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit: BPF prog-id=63 op=LOAD Mar 17 18:43:22.187000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002011d0 items=0 ppid=1777 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646234313335613564316466363830393232646337393438336161 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.187000 audit: BPF prog-id=64 op=LOAD Mar 17 18:43:22.187000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000201218 items=0 ppid=1777 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646234313335613564316466363830393232646337393438336161 Mar 17 18:43:22.187000 audit: BPF prog-id=64 op=UNLOAD Mar 17 18:43:22.187000 audit: BPF prog-id=63 op=UNLOAD Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.191000 audit: BPF prog-id=65 op=LOAD Mar 17 18:43:22.191000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000201628 items=0 ppid=1777 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646234313335613564316466363830393232646337393438336161 Mar 17 18:43:22.206618 systemd[1]: Started cri-containerd-0e9db12362334587fc19b422d356b2cc798a5e6d0ec55188539b4776c7ea7b7b.scope. Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.245000 audit: BPF prog-id=66 op=LOAD Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1800 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396462313233363233333435383766633139623432326433353662 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1800 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396462313233363233333435383766633139623432326433353662 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit: BPF prog-id=67 op=LOAD Mar 17 18:43:22.246000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cebf0 items=0 ppid=1800 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396462313233363233333435383766633139623432326433353662 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit: BPF prog-id=68 op=LOAD Mar 17 18:43:22.246000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cec38 items=0 ppid=1800 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396462313233363233333435383766633139623432326433353662 Mar 17 18:43:22.246000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:43:22.246000 audit: BPF prog-id=67 op=UNLOAD Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.246000 audit: BPF prog-id=69 op=LOAD Mar 17 18:43:22.246000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cf048 items=0 ppid=1800 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396462313233363233333435383766633139623432326433353662 Mar 17 18:43:22.260798 env[1222]: time="2025-03-17T18:43:22.260615042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:bb27a09ae6978456be966a1bcacff26b,Namespace:kube-system,Attempt:0,} returns sandbox id \"62a38c8f1262f9d19bf57f4f5e943ecf3612312d4ecd379c9a917124145df788\"" Mar 17 18:43:22.265707 kubelet[1721]: E0317 18:43:22.265226 1721 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-21291" Mar 17 18:43:22.268390 env[1222]: time="2025-03-17T18:43:22.268337845Z" level=info msg="CreateContainer within sandbox \"62a38c8f1262f9d19bf57f4f5e943ecf3612312d4ecd379c9a917124145df788\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Mar 17 18:43:22.286619 env[1222]: time="2025-03-17T18:43:22.286553685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:841bf4b08d8df8d4fdc8734abd74fbe0,Namespace:kube-system,Attempt:0,} returns sandbox id \"60db4135a5d1df680922dc79483aa6ec60b9f5c5655b147510352017ed72348c\"" Mar 17 18:43:22.289198 kubelet[1721]: E0317 18:43:22.288795 1721 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-21291" Mar 17 18:43:22.290961 env[1222]: time="2025-03-17T18:43:22.290904512Z" level=info msg="CreateContainer within sandbox \"60db4135a5d1df680922dc79483aa6ec60b9f5c5655b147510352017ed72348c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Mar 17 18:43:22.308009 env[1222]: time="2025-03-17T18:43:22.307931877Z" level=info msg="CreateContainer within sandbox \"62a38c8f1262f9d19bf57f4f5e943ecf3612312d4ecd379c9a917124145df788\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"14867eeb2e845018bc7a03dd558f839cc1b067a8abae5594c94006cac1e843b8\"" Mar 17 18:43:22.309099 env[1222]: time="2025-03-17T18:43:22.309057998Z" level=info msg="StartContainer for \"14867eeb2e845018bc7a03dd558f839cc1b067a8abae5594c94006cac1e843b8\"" Mar 17 18:43:22.319660 env[1222]: time="2025-03-17T18:43:22.319599022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal,Uid:9e5d63d4ec72d7209214d06dc2921dad,Namespace:kube-system,Attempt:0,} returns sandbox id \"0e9db12362334587fc19b422d356b2cc798a5e6d0ec55188539b4776c7ea7b7b\"" Mar 17 18:43:22.322028 kubelet[1721]: E0317 18:43:22.321978 1721 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flat" Mar 17 18:43:22.324375 env[1222]: time="2025-03-17T18:43:22.324325410Z" level=info msg="CreateContainer within sandbox \"0e9db12362334587fc19b422d356b2cc798a5e6d0ec55188539b4776c7ea7b7b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Mar 17 18:43:22.325997 env[1222]: time="2025-03-17T18:43:22.325940467Z" level=info msg="CreateContainer within sandbox \"60db4135a5d1df680922dc79483aa6ec60b9f5c5655b147510352017ed72348c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b690c8ad2467ecd995539c584f2a9067aae843f6e6e42087137bf3138d95db08\"" Mar 17 18:43:22.327232 env[1222]: time="2025-03-17T18:43:22.327188396Z" level=info msg="StartContainer for \"b690c8ad2467ecd995539c584f2a9067aae843f6e6e42087137bf3138d95db08\"" Mar 17 18:43:22.363184 env[1222]: time="2025-03-17T18:43:22.363128832Z" level=info msg="CreateContainer within sandbox \"0e9db12362334587fc19b422d356b2cc798a5e6d0ec55188539b4776c7ea7b7b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c54812101b42d02bc80b2d827c06ea363e5e81bf9e2a0da8bd531e199d91e4db\"" Mar 17 18:43:22.365996 systemd[1]: Started cri-containerd-14867eeb2e845018bc7a03dd558f839cc1b067a8abae5594c94006cac1e843b8.scope. Mar 17 18:43:22.371595 env[1222]: time="2025-03-17T18:43:22.368468714Z" level=info msg="StartContainer for \"c54812101b42d02bc80b2d827c06ea363e5e81bf9e2a0da8bd531e199d91e4db\"" Mar 17 18:43:22.373008 kubelet[1721]: W0317 18:43:22.372871 1721 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.56:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.56:6443: connect: connection refused Mar 17 18:43:22.373008 kubelet[1721]: E0317 18:43:22.372944 1721 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.56:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.56:6443: connect: connection refused" logger="UnhandledError" Mar 17 18:43:22.396132 systemd[1]: Started cri-containerd-b690c8ad2467ecd995539c584f2a9067aae843f6e6e42087137bf3138d95db08.scope. Mar 17 18:43:22.426706 kernel: kauditd_printk_skb: 387 callbacks suppressed Mar 17 18:43:22.426846 kernel: audit: type=1400 audit(1742237002.419:490): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.525709 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:43:22.525874 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 18:43:22.525911 kernel: audit: backlog limit exceeded Mar 17 18:43:22.525983 kernel: audit: type=1400 audit(1742237002.419:491): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.526019 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:43:22.526048 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 18:43:22.526078 kernel: audit: type=1400 audit(1742237002.419:492): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.526113 kernel: audit: backlog limit exceeded Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.540352 kubelet[1721]: E0317 18:43:22.540261 1721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.56:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.56:6443: connect: connection refused" interval="1.6s" Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.565519 kernel: audit: type=1400 audit(1742237002.419:493): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.449000 audit: BPF prog-id=70 op=LOAD Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1777 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393063386164323436376563643939353533396335383466326139 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1777 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393063386164323436376563643939353533396335383466326139 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit: BPF prog-id=71 op=LOAD Mar 17 18:43:22.450000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028c370 items=0 ppid=1777 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393063386164323436376563643939353533396335383466326139 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit: BPF prog-id=72 op=LOAD Mar 17 18:43:22.450000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028c3b8 items=0 ppid=1777 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393063386164323436376563643939353533396335383466326139 Mar 17 18:43:22.450000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:43:22.450000 audit: BPF prog-id=71 op=UNLOAD Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.450000 audit: BPF prog-id=73 op=LOAD Mar 17 18:43:22.450000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028c7c8 items=0 ppid=1777 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393063386164323436376563643939353533396335383466326139 Mar 17 18:43:22.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.567000 audit: BPF prog-id=74 op=LOAD Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1758 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134383637656562326538343530313862633761303364643535386638 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1758 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134383637656562326538343530313862633761303364643535386638 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit: BPF prog-id=75 op=LOAD Mar 17 18:43:22.568000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028fc50 items=0 ppid=1758 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134383637656562326538343530313862633761303364643535386638 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit: BPF prog-id=76 op=LOAD Mar 17 18:43:22.568000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028fc98 items=0 ppid=1758 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134383637656562326538343530313862633761303364643535386638 Mar 17 18:43:22.568000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:43:22.568000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.568000 audit: BPF prog-id=77 op=LOAD Mar 17 18:43:22.568000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0004060a8 items=0 ppid=1758 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134383637656562326538343530313862633761303364643535386638 Mar 17 18:43:22.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.56:22-212.252.73.82:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:22.588668 systemd[1]: Started cri-containerd-c54812101b42d02bc80b2d827c06ea363e5e81bf9e2a0da8bd531e199d91e4db.scope. Mar 17 18:43:22.590953 systemd[1]: Started sshd@11-10.128.0.56:22-212.252.73.82:43844.service. Mar 17 18:43:22.611629 env[1222]: time="2025-03-17T18:43:22.611567604Z" level=info msg="StartContainer for \"b690c8ad2467ecd995539c584f2a9067aae843f6e6e42087137bf3138d95db08\" returns successfully" Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.638000 audit: BPF prog-id=78 op=LOAD Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1800 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343831323130316234326430326263383062326438323763303665 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1800 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343831323130316234326430326263383062326438323763303665 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit: BPF prog-id=79 op=LOAD Mar 17 18:43:22.639000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028bf30 items=0 ppid=1800 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343831323130316234326430326263383062326438323763303665 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.639000 audit: BPF prog-id=80 op=LOAD Mar 17 18:43:22.639000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028bf78 items=0 ppid=1800 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343831323130316234326430326263383062326438323763303665 Mar 17 18:43:22.640000 audit: BPF prog-id=80 op=UNLOAD Mar 17 18:43:22.640000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.640000 audit: BPF prog-id=81 op=LOAD Mar 17 18:43:22.640000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00041a388 items=0 ppid=1800 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343831323130316234326430326263383062326438323763303665 Mar 17 18:43:22.695654 env[1222]: time="2025-03-17T18:43:22.695596639Z" level=info msg="StartContainer for \"14867eeb2e845018bc7a03dd558f839cc1b067a8abae5594c94006cac1e843b8\" returns successfully" Mar 17 18:43:22.717109 env[1222]: time="2025-03-17T18:43:22.717048119Z" level=info msg="StartContainer for \"c54812101b42d02bc80b2d827c06ea363e5e81bf9e2a0da8bd531e199d91e4db\" returns successfully" Mar 17 18:43:22.732894 kubelet[1721]: I0317 18:43:22.732391 1721 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:22.732894 kubelet[1721]: E0317 18:43:22.732838 1721 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.56:6443/api/v1/nodes\": dial tcp 10.128.0.56:6443: connect: connection refused" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:24.339273 kubelet[1721]: I0317 18:43:24.339237 1721 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:25.878000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:25.879000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:25.879000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005e3ad0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:25.879000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:25.878000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d2c1a0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:25.878000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:26.387000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.387000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003693830 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.387000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.388000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.388000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00306aaa0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.388000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.388000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003693a40 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.397000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.397000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0034ec300 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.397000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.407000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.407000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c005127060 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.429000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:26.429000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006dae300 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:43:26.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:43:26.674995 kubelet[1721]: E0317 18:43:26.674820 1721 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" not found" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:26.731500 kubelet[1721]: I0317 18:43:26.731456 1721 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:26.744861 update_engine[1215]: I0317 18:43:26.743994 1215 update_attempter.cc:509] Updating boot flags... Mar 17 18:43:27.102490 kubelet[1721]: I0317 18:43:27.101155 1721 apiserver.go:52] "Watching apiserver" Mar 17 18:43:27.133858 kubelet[1721]: I0317 18:43:27.133777 1721 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 18:43:28.122771 sshd[1955]: Invalid user NL5xUDpV2xRa from 212.252.73.82 port 43844 Mar 17 18:43:28.124717 sshd[1955]: userauth_pubkey: parse publickey packet: incomplete message [preauth] Mar 17 18:43:28.130000 audit[1955]: USER_ERR pid=1955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=212.252.73.82 addr=212.252.73.82 terminal=ssh res=failed' Mar 17 18:43:28.136893 kernel: kauditd_printk_skb: 190 callbacks suppressed Mar 17 18:43:28.137049 kernel: audit: type=1109 audit(1742237008.130:551): pid=1955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=212.252.73.82 addr=212.252.73.82 terminal=ssh res=failed' Mar 17 18:43:28.134509 systemd[1]: sshd@11-10.128.0.56:22-212.252.73.82:43844.service: Deactivated successfully. Mar 17 18:43:28.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.56:22-212.252.73.82:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:28.187447 kernel: audit: type=1131 audit(1742237008.134:552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.56:22-212.252.73.82:43844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:28.625056 kubelet[1721]: W0317 18:43:28.625006 1721 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:28.672511 kubelet[1721]: W0317 18:43:28.672446 1721 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:29.086948 systemd[1]: Reloading. Mar 17 18:43:29.202205 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2025-03-17T18:43:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:43:29.202850 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2025-03-17T18:43:29Z" level=info msg="torcx already run" Mar 17 18:43:29.315203 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:43:29.315232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:43:29.340189 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.498128 kernel: audit: type=1400 audit(1742237009.455:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.498302 kernel: audit: type=1400 audit(1742237009.455:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.519436 kernel: audit: type=1400 audit(1742237009.455:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.562189 kernel: audit: type=1400 audit(1742237009.455:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.562376 kernel: audit: type=1400 audit(1742237009.455:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.584600 kernel: audit: type=1400 audit(1742237009.455:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.606632 kernel: audit: type=1400 audit(1742237009.455:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.629639 kernel: audit: type=1400 audit(1742237009.455:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit: BPF prog-id=82 op=LOAD Mar 17 18:43:29.518000 audit: BPF prog-id=43 op=UNLOAD Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit: BPF prog-id=83 op=LOAD Mar 17 18:43:29.539000 audit: BPF prog-id=44 op=UNLOAD Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit: BPF prog-id=84 op=LOAD Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit: BPF prog-id=85 op=LOAD Mar 17 18:43:29.561000 audit: BPF prog-id=45 op=UNLOAD Mar 17 18:43:29.561000 audit: BPF prog-id=46 op=UNLOAD Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit: BPF prog-id=86 op=LOAD Mar 17 18:43:29.583000 audit: BPF prog-id=66 op=UNLOAD Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.604000 audit: BPF prog-id=87 op=LOAD Mar 17 18:43:29.604000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit: BPF prog-id=88 op=LOAD Mar 17 18:43:29.630000 audit: BPF prog-id=47 op=UNLOAD Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.631000 audit: BPF prog-id=48 op=UNLOAD Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.632000 audit: BPF prog-id=91 op=LOAD Mar 17 18:43:29.632000 audit: BPF prog-id=50 op=UNLOAD Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.634000 audit: BPF prog-id=92 op=LOAD Mar 17 18:43:29.634000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.636000 audit: BPF prog-id=93 op=LOAD Mar 17 18:43:29.636000 audit: BPF prog-id=62 op=UNLOAD Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.637000 audit: BPF prog-id=94 op=LOAD Mar 17 18:43:29.637000 audit: BPF prog-id=58 op=UNLOAD Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.640000 audit: BPF prog-id=95 op=LOAD Mar 17 18:43:29.640000 audit: BPF prog-id=51 op=UNLOAD Mar 17 18:43:29.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.641000 audit: BPF prog-id=96 op=LOAD Mar 17 18:43:29.641000 audit: BPF prog-id=52 op=UNLOAD Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit: BPF prog-id=97 op=LOAD Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.642000 audit: BPF prog-id=98 op=LOAD Mar 17 18:43:29.642000 audit: BPF prog-id=53 op=UNLOAD Mar 17 18:43:29.642000 audit: BPF prog-id=54 op=UNLOAD Mar 17 18:43:29.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.645000 audit: BPF prog-id=99 op=LOAD Mar 17 18:43:29.645000 audit: BPF prog-id=74 op=UNLOAD Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit: BPF prog-id=100 op=LOAD Mar 17 18:43:29.648000 audit: BPF prog-id=55 op=UNLOAD Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit: BPF prog-id=101 op=LOAD Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:29.648000 audit: BPF prog-id=102 op=LOAD Mar 17 18:43:29.648000 audit: BPF prog-id=56 op=UNLOAD Mar 17 18:43:29.648000 audit: BPF prog-id=57 op=UNLOAD Mar 17 18:43:29.678591 systemd[1]: Stopping kubelet.service... Mar 17 18:43:29.706028 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:43:29.706329 systemd[1]: Stopped kubelet.service. Mar 17 18:43:29.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:29.706473 systemd[1]: kubelet.service: Consumed 1.011s CPU time. Mar 17 18:43:29.709819 systemd[1]: Starting kubelet.service... Mar 17 18:43:29.940458 systemd[1]: Started kubelet.service. Mar 17 18:43:29.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:30.035162 kubelet[2083]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:43:30.035800 kubelet[2083]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:43:30.035921 kubelet[2083]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:43:30.036167 kubelet[2083]: I0317 18:43:30.036125 2083 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:43:30.061261 kubelet[2083]: I0317 18:43:30.061210 2083 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 18:43:30.061584 kubelet[2083]: I0317 18:43:30.061558 2083 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:43:30.062181 kubelet[2083]: I0317 18:43:30.062141 2083 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 18:43:30.068118 kubelet[2083]: I0317 18:43:30.067702 2083 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Mar 17 18:43:30.071600 kubelet[2083]: I0317 18:43:30.071555 2083 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:43:30.084217 kubelet[2083]: E0317 18:43:30.084100 2083 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:43:30.084451 kubelet[2083]: I0317 18:43:30.084426 2083 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:43:30.094503 kubelet[2083]: I0317 18:43:30.094388 2083 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:43:30.094982 kubelet[2083]: I0317 18:43:30.094958 2083 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 18:43:30.095457 kubelet[2083]: I0317 18:43:30.095364 2083 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:43:30.095903 kubelet[2083]: I0317 18:43:30.095606 2083 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:43:30.096166 kubelet[2083]: I0317 18:43:30.096144 2083 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:43:30.096312 kubelet[2083]: I0317 18:43:30.096297 2083 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 18:43:30.096498 kubelet[2083]: I0317 18:43:30.096482 2083 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:43:30.096916 kubelet[2083]: I0317 18:43:30.096879 2083 kubelet.go:408] "Attempting to sync node with API server" Mar 17 18:43:30.098024 kubelet[2083]: I0317 18:43:30.098003 2083 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:43:30.098240 kubelet[2083]: I0317 18:43:30.098225 2083 kubelet.go:314] "Adding apiserver pod source" Mar 17 18:43:30.118557 kubelet[2083]: I0317 18:43:30.118506 2083 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:43:30.120295 kubelet[2083]: I0317 18:43:30.120261 2083 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:43:30.120963 kubelet[2083]: I0317 18:43:30.120937 2083 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:43:30.122849 kubelet[2083]: I0317 18:43:30.122825 2083 server.go:1269] "Started kubelet" Mar 17 18:43:30.131611 kubelet[2083]: I0317 18:43:30.130926 2083 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:43:30.137454 kubelet[2083]: I0317 18:43:30.133307 2083 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:43:30.137454 kubelet[2083]: I0317 18:43:30.133450 2083 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:43:30.138682 kubelet[2083]: I0317 18:43:30.138625 2083 server.go:460] "Adding debug handlers to kubelet server" Mar 17 18:43:30.137000 audit[2083]: AVC avc: denied { mac_admin } for pid=2083 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:30.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:30.137000 audit[2083]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00082d980 a1=c00088bf08 a2=c00082d950 a3=25 items=0 ppid=1 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:30.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:30.139516 kubelet[2083]: I0317 18:43:30.139487 2083 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:43:30.138000 audit[2083]: AVC avc: denied { mac_admin } for pid=2083 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:30.138000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:30.138000 audit[2083]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5ed60 a1=c00088bf20 a2=c00082da10 a3=25 items=0 ppid=1 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:30.138000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:30.140039 kubelet[2083]: I0317 18:43:30.140014 2083 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:43:30.140169 kubelet[2083]: I0317 18:43:30.140154 2083 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:43:30.154018 kubelet[2083]: I0317 18:43:30.153979 2083 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:43:30.157122 kubelet[2083]: I0317 18:43:30.157093 2083 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 18:43:30.159691 kubelet[2083]: I0317 18:43:30.159190 2083 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 18:43:30.160122 kubelet[2083]: I0317 18:43:30.160103 2083 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:43:30.162214 kubelet[2083]: I0317 18:43:30.162189 2083 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:43:30.162524 kubelet[2083]: I0317 18:43:30.162501 2083 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:43:30.164466 kubelet[2083]: I0317 18:43:30.164442 2083 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:43:30.184053 kubelet[2083]: I0317 18:43:30.183985 2083 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:43:30.186920 kubelet[2083]: I0317 18:43:30.186071 2083 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:43:30.186920 kubelet[2083]: I0317 18:43:30.186154 2083 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:43:30.186920 kubelet[2083]: I0317 18:43:30.186209 2083 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 18:43:30.186920 kubelet[2083]: E0317 18:43:30.186310 2083 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 18:43:30.287465 kubelet[2083]: E0317 18:43:30.287355 2083 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Mar 17 18:43:30.294991 kubelet[2083]: I0317 18:43:30.294957 2083 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:43:30.295319 kubelet[2083]: I0317 18:43:30.295301 2083 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:43:30.295474 kubelet[2083]: I0317 18:43:30.295458 2083 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:43:30.295850 kubelet[2083]: I0317 18:43:30.295822 2083 state_mem.go:88] "Updated default CPUSet" cpuSet="" Mar 17 18:43:30.296020 kubelet[2083]: I0317 18:43:30.295980 2083 state_mem.go:96] "Updated CPUSet assignments" assignments={} Mar 17 18:43:30.296139 kubelet[2083]: I0317 18:43:30.296125 2083 policy_none.go:49] "None policy: Start" Mar 17 18:43:30.297279 kubelet[2083]: I0317 18:43:30.297256 2083 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:43:30.297498 kubelet[2083]: I0317 18:43:30.297481 2083 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:43:30.297879 kubelet[2083]: I0317 18:43:30.297857 2083 state_mem.go:75] "Updated machine memory state" Mar 17 18:43:30.308271 kubelet[2083]: I0317 18:43:30.308242 2083 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:43:30.307000 audit[2083]: AVC avc: denied { mac_admin } for pid=2083 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:30.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:43:30.307000 audit[2083]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010d48a0 a1=c000a83ce0 a2=c0010d4870 a3=25 items=0 ppid=1 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:30.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:43:30.309535 kubelet[2083]: I0317 18:43:30.309508 2083 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:43:30.309865 kubelet[2083]: I0317 18:43:30.309848 2083 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:43:30.310032 kubelet[2083]: I0317 18:43:30.309973 2083 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:43:30.310590 kubelet[2083]: I0317 18:43:30.310568 2083 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:43:30.437176 kubelet[2083]: I0317 18:43:30.437113 2083 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.449028 kubelet[2083]: I0317 18:43:30.448986 2083 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.449427 kubelet[2083]: I0317 18:43:30.449380 2083 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.502542 kubelet[2083]: W0317 18:43:30.502502 2083 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:30.503348 kubelet[2083]: W0317 18:43:30.503321 2083 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:30.503738 kubelet[2083]: E0317 18:43:30.503699 2083 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.504199 kubelet[2083]: W0317 18:43:30.504168 2083 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:30.504434 kubelet[2083]: E0317 18:43:30.504253 2083 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.563949 kubelet[2083]: I0317 18:43:30.563767 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564365 kubelet[2083]: I0317 18:43:30.564295 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564365 kubelet[2083]: I0317 18:43:30.564350 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564620 kubelet[2083]: I0317 18:43:30.564388 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564620 kubelet[2083]: I0317 18:43:30.564440 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564620 kubelet[2083]: I0317 18:43:30.564471 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/841bf4b08d8df8d4fdc8734abd74fbe0-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"841bf4b08d8df8d4fdc8734abd74fbe0\") " pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564620 kubelet[2083]: I0317 18:43:30.564501 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564832 kubelet[2083]: I0317 18:43:30.564529 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9e5d63d4ec72d7209214d06dc2921dad-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"9e5d63d4ec72d7209214d06dc2921dad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:30.564832 kubelet[2083]: I0317 18:43:30.564557 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bb27a09ae6978456be966a1bcacff26b-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" (UID: \"bb27a09ae6978456be966a1bcacff26b\") " pod="kube-system/kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:31.120546 kubelet[2083]: I0317 18:43:31.120505 2083 apiserver.go:52] "Watching apiserver" Mar 17 18:43:31.160445 kubelet[2083]: I0317 18:43:31.160384 2083 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 18:43:31.266584 kubelet[2083]: W0317 18:43:31.266535 2083 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Mar 17 18:43:31.266808 kubelet[2083]: E0317 18:43:31.266644 2083 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:43:31.311137 kubelet[2083]: I0317 18:43:31.311047 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" podStartSLOduration=1.311019153 podStartE2EDuration="1.311019153s" podCreationTimestamp="2025-03-17 18:43:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:43:31.289920908 +0000 UTC m=+1.342878241" watchObservedRunningTime="2025-03-17 18:43:31.311019153 +0000 UTC m=+1.363976485" Mar 17 18:43:31.347327 kubelet[2083]: I0317 18:43:31.347254 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" podStartSLOduration=3.347225217 podStartE2EDuration="3.347225217s" podCreationTimestamp="2025-03-17 18:43:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:43:31.31199348 +0000 UTC m=+1.364950814" watchObservedRunningTime="2025-03-17 18:43:31.347225217 +0000 UTC m=+1.400182548" Mar 17 18:43:31.389750 kubelet[2083]: I0317 18:43:31.389571 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" podStartSLOduration=3.389546652 podStartE2EDuration="3.389546652s" podCreationTimestamp="2025-03-17 18:43:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:43:31.348507706 +0000 UTC m=+1.401465039" watchObservedRunningTime="2025-03-17 18:43:31.389546652 +0000 UTC m=+1.442503989" Mar 17 18:43:31.467000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:31.467000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001397460 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:31.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:31.470000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:31.470000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001397600 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:31.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:31.471000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:31.471000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001397920 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:31.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:31.474000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:43:31.474000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0014db8e0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:31.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:32.156000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Mar 17 18:43:32.156000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008421c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:43:32.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:43:34.218750 sudo[1464]: pam_unix(sudo:session): session closed for user root Mar 17 18:43:34.217000 audit[1464]: USER_END pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.224814 kernel: kauditd_printk_skb: 311 callbacks suppressed Mar 17 18:43:34.224934 kernel: audit: type=1106 audit(1742237014.217:784): pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.217000 audit[1464]: CRED_DISP pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.267780 sshd[1461]: pam_unix(sshd:session): session closed for user core Mar 17 18:43:34.276206 kernel: audit: type=1104 audit(1742237014.217:785): pid=1464 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.276000 audit[1461]: USER_END pid=1461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:34.281746 systemd[1]: sshd@8-10.128.0.56:22-139.178.89.65:42866.service: Deactivated successfully. Mar 17 18:43:34.283014 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 18:43:34.283232 systemd[1]: session-9.scope: Consumed 6.453s CPU time. Mar 17 18:43:34.298803 systemd-logind[1212]: Session 9 logged out. Waiting for processes to exit. Mar 17 18:43:34.301089 systemd-logind[1212]: Removed session 9. Mar 17 18:43:34.318708 kernel: audit: type=1106 audit(1742237014.276:786): pid=1461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:34.318922 kernel: audit: type=1104 audit(1742237014.276:787): pid=1461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:34.276000 audit[1461]: CRED_DISP pid=1461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:43:34.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.56:22-139.178.89.65:42866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.363454 kernel: audit: type=1131 audit(1742237014.280:788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.56:22-139.178.89.65:42866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:34.468010 kubelet[2083]: I0317 18:43:34.467959 2083 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Mar 17 18:43:34.470701 env[1222]: time="2025-03-17T18:43:34.469383420Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:43:34.471753 kubelet[2083]: I0317 18:43:34.471723 2083 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Mar 17 18:43:35.234280 systemd[1]: Created slice kubepods-besteffort-poda74fe3d5_bddc_4b9e_8767_013274c05658.slice. Mar 17 18:43:35.394765 kubelet[2083]: I0317 18:43:35.394705 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a74fe3d5-bddc-4b9e-8767-013274c05658-kube-proxy\") pod \"kube-proxy-b669f\" (UID: \"a74fe3d5-bddc-4b9e-8767-013274c05658\") " pod="kube-system/kube-proxy-b669f" Mar 17 18:43:35.394977 kubelet[2083]: I0317 18:43:35.394778 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a74fe3d5-bddc-4b9e-8767-013274c05658-xtables-lock\") pod \"kube-proxy-b669f\" (UID: \"a74fe3d5-bddc-4b9e-8767-013274c05658\") " pod="kube-system/kube-proxy-b669f" Mar 17 18:43:35.394977 kubelet[2083]: I0317 18:43:35.394812 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h99cp\" (UniqueName: \"kubernetes.io/projected/a74fe3d5-bddc-4b9e-8767-013274c05658-kube-api-access-h99cp\") pod \"kube-proxy-b669f\" (UID: \"a74fe3d5-bddc-4b9e-8767-013274c05658\") " pod="kube-system/kube-proxy-b669f" Mar 17 18:43:35.394977 kubelet[2083]: I0317 18:43:35.394848 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a74fe3d5-bddc-4b9e-8767-013274c05658-lib-modules\") pod \"kube-proxy-b669f\" (UID: \"a74fe3d5-bddc-4b9e-8767-013274c05658\") " pod="kube-system/kube-proxy-b669f" Mar 17 18:43:35.506393 kubelet[2083]: I0317 18:43:35.506348 2083 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 18:43:35.545454 env[1222]: time="2025-03-17T18:43:35.544771340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b669f,Uid:a74fe3d5-bddc-4b9e-8767-013274c05658,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:35.583078 env[1222]: time="2025-03-17T18:43:35.582972210Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:35.583521 env[1222]: time="2025-03-17T18:43:35.583382414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:35.583809 env[1222]: time="2025-03-17T18:43:35.583746082Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:35.584288 env[1222]: time="2025-03-17T18:43:35.584225297Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21 pid=2164 runtime=io.containerd.runc.v2 Mar 17 18:43:35.634858 systemd[1]: Started cri-containerd-9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21.scope. Mar 17 18:43:35.644160 systemd[1]: Created slice kubepods-besteffort-pod37778b3f_d895_4904_9a55_47e1ff8b0e6b.slice. Mar 17 18:43:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708464 kernel: audit: type=1400 audit(1742237015.685:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.730521 kernel: audit: type=1400 audit(1742237015.686:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.773501 kernel: audit: type=1400 audit(1742237015.686:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.774134 kernel: audit: type=1400 audit(1742237015.686:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.774187 kernel: audit: type=1400 audit(1742237015.686:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.707000 audit: BPF prog-id=103 op=LOAD Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2164 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333239613466626565633339343363616239633535316232323438 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=2164 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333239613466626565633339343363616239633535316232323438 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.708000 audit: BPF prog-id=104 op=LOAD Mar 17 18:43:35.708000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0003ba390 items=0 ppid=2164 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333239613466626565633339343363616239633535316232323438 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.728000 audit: BPF prog-id=105 op=LOAD Mar 17 18:43:35.728000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000024f28 items=0 ppid=2164 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333239613466626565633339343363616239633535316232323438 Mar 17 18:43:35.729000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:43:35.729000 audit: BPF prog-id=104 op=UNLOAD Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.729000 audit: BPF prog-id=106 op=LOAD Mar 17 18:43:35.729000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000025338 items=0 ppid=2164 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333239613466626565633339343363616239633535316232323438 Mar 17 18:43:35.808945 kubelet[2083]: I0317 18:43:35.808903 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/37778b3f-d895-4904-9a55-47e1ff8b0e6b-var-lib-calico\") pod \"tigera-operator-76c4976dd7-qtrhw\" (UID: \"37778b3f-d895-4904-9a55-47e1ff8b0e6b\") " pod="tigera-operator/tigera-operator-76c4976dd7-qtrhw" Mar 17 18:43:35.809247 kubelet[2083]: I0317 18:43:35.809203 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wfgb2\" (UniqueName: \"kubernetes.io/projected/37778b3f-d895-4904-9a55-47e1ff8b0e6b-kube-api-access-wfgb2\") pod \"tigera-operator-76c4976dd7-qtrhw\" (UID: \"37778b3f-d895-4904-9a55-47e1ff8b0e6b\") " pod="tigera-operator/tigera-operator-76c4976dd7-qtrhw" Mar 17 18:43:35.816252 env[1222]: time="2025-03-17T18:43:35.816187923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b669f,Uid:a74fe3d5-bddc-4b9e-8767-013274c05658,Namespace:kube-system,Attempt:0,} returns sandbox id \"9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21\"" Mar 17 18:43:35.820671 env[1222]: time="2025-03-17T18:43:35.820447829Z" level=info msg="CreateContainer within sandbox \"9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:43:35.844842 env[1222]: time="2025-03-17T18:43:35.844758732Z" level=info msg="CreateContainer within sandbox \"9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0bd23ed04651c498da8c98a79eb849c70874cf8e58f051b080738936fb595410\"" Mar 17 18:43:35.846837 env[1222]: time="2025-03-17T18:43:35.846774000Z" level=info msg="StartContainer for \"0bd23ed04651c498da8c98a79eb849c70874cf8e58f051b080738936fb595410\"" Mar 17 18:43:35.875650 systemd[1]: Started cri-containerd-0bd23ed04651c498da8c98a79eb849c70874cf8e58f051b080738936fb595410.scope. Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f101a2a1238 items=0 ppid=2164 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643233656430343635316334393864613863393861373965623834 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.902000 audit: BPF prog-id=107 op=LOAD Mar 17 18:43:35.902000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f5d48 items=0 ppid=2164 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643233656430343635316334393864613863393861373965623834 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit: BPF prog-id=108 op=LOAD Mar 17 18:43:35.903000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f5d98 items=0 ppid=2164 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643233656430343635316334393864613863393861373965623834 Mar 17 18:43:35.903000 audit: BPF prog-id=108 op=UNLOAD Mar 17 18:43:35.903000 audit: BPF prog-id=107 op=UNLOAD Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:35.903000 audit: BPF prog-id=109 op=LOAD Mar 17 18:43:35.903000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f5e28 items=0 ppid=2164 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:35.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643233656430343635316334393864613863393861373965623834 Mar 17 18:43:35.936457 env[1222]: time="2025-03-17T18:43:35.934610182Z" level=info msg="StartContainer for \"0bd23ed04651c498da8c98a79eb849c70874cf8e58f051b080738936fb595410\" returns successfully" Mar 17 18:43:35.949963 env[1222]: time="2025-03-17T18:43:35.949902861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-qtrhw,Uid:37778b3f-d895-4904-9a55-47e1ff8b0e6b,Namespace:tigera-operator,Attempt:0,}" Mar 17 18:43:35.978506 env[1222]: time="2025-03-17T18:43:35.978372694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:35.978809 env[1222]: time="2025-03-17T18:43:35.978756441Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:35.978965 env[1222]: time="2025-03-17T18:43:35.978933009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:35.979314 env[1222]: time="2025-03-17T18:43:35.979272598Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/feb939bcb16f1634dd78918ec769325b30db75063d90fb72ca58b36a0068c828 pid=2242 runtime=io.containerd.runc.v2 Mar 17 18:43:36.034661 systemd[1]: Started cri-containerd-feb939bcb16f1634dd78918ec769325b30db75063d90fb72ca58b36a0068c828.scope. Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.065000 audit: BPF prog-id=110 op=LOAD Mar 17 18:43:36.070000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.070000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623933396263623136663136333464643738393138656337363933 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623933396263623136663136333464643738393138656337363933 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit: BPF prog-id=111 op=LOAD Mar 17 18:43:36.071000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002967e0 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623933396263623136663136333464643738393138656337363933 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.071000 audit: BPF prog-id=112 op=LOAD Mar 17 18:43:36.071000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000296828 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623933396263623136663136333464643738393138656337363933 Mar 17 18:43:36.074000 audit: BPF prog-id=112 op=UNLOAD Mar 17 18:43:36.074000 audit: BPF prog-id=111 op=UNLOAD Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:36.074000 audit: BPF prog-id=113 op=LOAD Mar 17 18:43:36.074000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000296c38 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623933396263623136663136333464643738393138656337363933 Mar 17 18:43:36.136906 env[1222]: time="2025-03-17T18:43:36.136800444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-qtrhw,Uid:37778b3f-d895-4904-9a55-47e1ff8b0e6b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"feb939bcb16f1634dd78918ec769325b30db75063d90fb72ca58b36a0068c828\"" Mar 17 18:43:36.140219 env[1222]: time="2025-03-17T18:43:36.140142433Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Mar 17 18:43:36.163000 audit[2311]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.163000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd503d7d0 a2=0 a3=7ffcd503d7bc items=0 ppid=2216 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:43:36.165000 audit[2312]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.165000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcadb84ab0 a2=0 a3=7ffcadb84a9c items=0 ppid=2216 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:43:36.167000 audit[2313]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.167000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc036a480 a2=0 a3=7ffdc036a46c items=0 ppid=2216 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:43:36.174000 audit[2314]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.174000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3f1edcd0 a2=0 a3=7ffe3f1edcbc items=0 ppid=2216 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:43:36.176000 audit[2315]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.176000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3c9709e0 a2=0 a3=7fff3c9709cc items=0 ppid=2216 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:43:36.178000 audit[2316]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.178000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71112720 a2=0 a3=7ffd7111270c items=0 ppid=2216 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:43:36.268000 audit[2317]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.268000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff78e03100 a2=0 a3=7fff78e030ec items=0 ppid=2216 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:43:36.273000 audit[2319]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.273000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdea740800 a2=0 a3=7ffdea7407ec items=0 ppid=2216 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:43:36.283000 audit[2322]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.283000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3b899a70 a2=0 a3=7ffc3b899a5c items=0 ppid=2216 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:43:36.285000 audit[2323]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.285000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeab79a1b0 a2=0 a3=7ffeab79a19c items=0 ppid=2216 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:43:36.289000 audit[2325]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.289000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7a1a3890 a2=0 a3=7ffc7a1a387c items=0 ppid=2216 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:43:36.291000 audit[2326]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.291000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd96362720 a2=0 a3=7ffd9636270c items=0 ppid=2216 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:43:36.296000 audit[2328]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.296000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdabb65890 a2=0 a3=7ffdabb6587c items=0 ppid=2216 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:43:36.302000 audit[2331]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.302000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffee9fc560 a2=0 a3=7fffee9fc54c items=0 ppid=2216 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:43:36.304000 audit[2332]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.304000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf9aa1b40 a2=0 a3=7ffcf9aa1b2c items=0 ppid=2216 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:43:36.309000 audit[2334]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.309000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc00fe3640 a2=0 a3=7ffc00fe362c items=0 ppid=2216 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:43:36.311000 audit[2335]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.311000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd48d111c0 a2=0 a3=7ffd48d111ac items=0 ppid=2216 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:43:36.316000 audit[2337]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.316000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff18115b40 a2=0 a3=7fff18115b2c items=0 ppid=2216 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:43:36.323000 audit[2340]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.323000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff715cdc10 a2=0 a3=7fff715cdbfc items=0 ppid=2216 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:43:36.330000 audit[2344]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.330000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3d2fa1b0 a2=0 a3=7ffc3d2fa19c items=0 ppid=2216 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:43:36.331000 audit[2345]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.331000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc126f7930 a2=0 a3=7ffc126f791c items=0 ppid=2216 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:43:36.335000 audit[2347]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.335000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef7b43f70 a2=0 a3=7ffef7b43f5c items=0 ppid=2216 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:43:36.341000 audit[2350]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.341000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb8a37120 a2=0 a3=7ffdb8a3710c items=0 ppid=2216 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:43:36.344000 audit[2351]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.344000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8bf9eab0 a2=0 a3=7ffc8bf9ea9c items=0 ppid=2216 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:43:36.350000 audit[2353]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:43:36.350000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffac7ba320 a2=0 a3=7fffac7ba30c items=0 ppid=2216 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:43:36.391000 audit[2359]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:36.391000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffed5230b0 a2=0 a3=7fffed52309c items=0 ppid=2216 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:36.402000 audit[2359]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:36.402000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffed5230b0 a2=0 a3=7fffed52309c items=0 ppid=2216 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:36.405000 audit[2364]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.405000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8db11c30 a2=0 a3=7ffc8db11c1c items=0 ppid=2216 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:43:36.411000 audit[2366]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.411000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb757f2c0 a2=0 a3=7ffdb757f2ac items=0 ppid=2216 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:43:36.418000 audit[2369]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.418000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdbf6c6df0 a2=0 a3=7ffdbf6c6ddc items=0 ppid=2216 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:43:36.420000 audit[2370]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.420000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd693bb350 a2=0 a3=7ffd693bb33c items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:43:36.424000 audit[2372]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.424000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee5f80eb0 a2=0 a3=7ffee5f80e9c items=0 ppid=2216 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:43:36.426000 audit[2373]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.426000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35be48c0 a2=0 a3=7ffe35be48ac items=0 ppid=2216 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:43:36.430000 audit[2375]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.430000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcc8ee820 a2=0 a3=7fffcc8ee80c items=0 ppid=2216 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:43:36.437000 audit[2378]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.437000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffef5920ca0 a2=0 a3=7ffef5920c8c items=0 ppid=2216 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:43:36.439000 audit[2379]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.439000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee507dec0 a2=0 a3=7ffee507deac items=0 ppid=2216 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:43:36.443000 audit[2381]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.443000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbe3ce900 a2=0 a3=7ffcbe3ce8ec items=0 ppid=2216 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:43:36.446000 audit[2382]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.446000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91d10de0 a2=0 a3=7ffd91d10dcc items=0 ppid=2216 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:43:36.452000 audit[2384]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.452000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0e6cd9e0 a2=0 a3=7ffe0e6cd9cc items=0 ppid=2216 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:43:36.458000 audit[2387]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.458000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0cf3ae30 a2=0 a3=7ffc0cf3ae1c items=0 ppid=2216 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:43:36.465000 audit[2390]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.465000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb3640920 a2=0 a3=7ffdb364090c items=0 ppid=2216 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:43:36.467000 audit[2391]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.467000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc71ac26f0 a2=0 a3=7ffc71ac26dc items=0 ppid=2216 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:43:36.471000 audit[2393]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.471000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe63e9b8e0 a2=0 a3=7ffe63e9b8cc items=0 ppid=2216 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:43:36.477000 audit[2396]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.477000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff514ff060 a2=0 a3=7fff514ff04c items=0 ppid=2216 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:43:36.479000 audit[2397]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.479000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7a33a9f0 a2=0 a3=7ffe7a33a9dc items=0 ppid=2216 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:43:36.483000 audit[2399]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.483000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd64cbc620 a2=0 a3=7ffd64cbc60c items=0 ppid=2216 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.483000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:43:36.485000 audit[2400]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.485000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc323214d0 a2=0 a3=7ffc323214bc items=0 ppid=2216 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:43:36.489000 audit[2402]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.489000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe874af110 a2=0 a3=7ffe874af0fc items=0 ppid=2216 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:43:36.494000 audit[2405]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:43:36.494000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe98ca8bd0 a2=0 a3=7ffe98ca8bbc items=0 ppid=2216 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:43:36.499000 audit[2407]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:43:36.499000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffbd0c0a50 a2=0 a3=7fffbd0c0a3c items=0 ppid=2216 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.499000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:36.499000 audit[2407]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:43:36.499000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffbd0c0a50 a2=0 a3=7fffbd0c0a3c items=0 ppid=2216 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:36.499000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:36.523830 systemd[1]: run-containerd-runc-k8s.io-9c329a4fbeec3943cab9c551b2248cc1cbb1d84964b5d5eff128864e90ebfd21-runc.zoFfiM.mount: Deactivated successfully. Mar 17 18:43:37.879924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302229452.mount: Deactivated successfully. Mar 17 18:43:38.763236 env[1222]: time="2025-03-17T18:43:38.763157441Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:38.765921 env[1222]: time="2025-03-17T18:43:38.765868285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:38.768817 env[1222]: time="2025-03-17T18:43:38.768759299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:38.770901 env[1222]: time="2025-03-17T18:43:38.770832730Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:38.771948 env[1222]: time="2025-03-17T18:43:38.771896081Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Mar 17 18:43:38.775972 env[1222]: time="2025-03-17T18:43:38.775162575Z" level=info msg="CreateContainer within sandbox \"feb939bcb16f1634dd78918ec769325b30db75063d90fb72ca58b36a0068c828\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Mar 17 18:43:38.796106 env[1222]: time="2025-03-17T18:43:38.796025030Z" level=info msg="CreateContainer within sandbox \"feb939bcb16f1634dd78918ec769325b30db75063d90fb72ca58b36a0068c828\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"19efa08f56b8e1c2d6260e462c92113d8c8658ec2a7098487fbe3fe4289c24c6\"" Mar 17 18:43:38.798581 env[1222]: time="2025-03-17T18:43:38.797994815Z" level=info msg="StartContainer for \"19efa08f56b8e1c2d6260e462c92113d8c8658ec2a7098487fbe3fe4289c24c6\"" Mar 17 18:43:38.835329 systemd[1]: Started cri-containerd-19efa08f56b8e1c2d6260e462c92113d8c8658ec2a7098487fbe3fe4289c24c6.scope. Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.852000 audit: BPF prog-id=114 op=LOAD Mar 17 18:43:38.853000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.853000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:38.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139656661303866353662386531633264363236306534363263393231 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:38.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139656661303866353662386531633264363236306534363263393231 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit: BPF prog-id=115 op=LOAD Mar 17 18:43:38.854000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003991f0 items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:38.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139656661303866353662386531633264363236306534363263393231 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.854000 audit: BPF prog-id=116 op=LOAD Mar 17 18:43:38.854000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000399238 items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:38.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139656661303866353662386531633264363236306534363263393231 Mar 17 18:43:38.855000 audit: BPF prog-id=116 op=UNLOAD Mar 17 18:43:38.855000 audit: BPF prog-id=115 op=UNLOAD Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:38.855000 audit: BPF prog-id=117 op=LOAD Mar 17 18:43:38.855000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000399648 items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:38.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139656661303866353662386531633264363236306534363263393231 Mar 17 18:43:38.876371 env[1222]: time="2025-03-17T18:43:38.876300828Z" level=info msg="StartContainer for \"19efa08f56b8e1c2d6260e462c92113d8c8658ec2a7098487fbe3fe4289c24c6\" returns successfully" Mar 17 18:43:38.949124 kubelet[2083]: I0317 18:43:38.949031 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-b669f" podStartSLOduration=3.94899033 podStartE2EDuration="3.94899033s" podCreationTimestamp="2025-03-17 18:43:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:43:36.264065759 +0000 UTC m=+6.317023088" watchObservedRunningTime="2025-03-17 18:43:38.94899033 +0000 UTC m=+9.001947661" Mar 17 18:43:39.291343 kubelet[2083]: I0317 18:43:39.291248 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-qtrhw" podStartSLOduration=1.656598759 podStartE2EDuration="4.291220887s" podCreationTimestamp="2025-03-17 18:43:35 +0000 UTC" firstStartedPulling="2025-03-17 18:43:36.139005858 +0000 UTC m=+6.191963170" lastFinishedPulling="2025-03-17 18:43:38.773627971 +0000 UTC m=+8.826585298" observedRunningTime="2025-03-17 18:43:39.271744691 +0000 UTC m=+9.324702027" watchObservedRunningTime="2025-03-17 18:43:39.291220887 +0000 UTC m=+9.344178218" Mar 17 18:43:42.053000 audit[2449]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.061694 kernel: kauditd_printk_skb: 362 callbacks suppressed Mar 17 18:43:42.061833 kernel: audit: type=1325 audit(1742237022.053:900): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.053000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc3c68adf0 a2=0 a3=7ffc3c68addc items=0 ppid=2216 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.111512 kernel: audit: type=1300 audit(1742237022.053:900): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc3c68adf0 a2=0 a3=7ffc3c68addc items=0 ppid=2216 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.114329 kernel: audit: type=1327 audit(1742237022.053:900): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.112000 audit[2449]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.143179 kernel: audit: type=1325 audit(1742237022.112:901): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.143371 kernel: audit: type=1300 audit(1742237022.112:901): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc3c68adf0 a2=0 a3=0 items=0 ppid=2216 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.112000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc3c68adf0 a2=0 a3=0 items=0 ppid=2216 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.191437 kernel: audit: type=1327 audit(1742237022.112:901): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.153000 audit[2451]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.209442 kernel: audit: type=1325 audit(1742237022.153:902): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.153000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf25ec610 a2=0 a3=7ffcf25ec5fc items=0 ppid=2216 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.262351 kernel: audit: type=1300 audit(1742237022.153:902): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf25ec610 a2=0 a3=7ffcf25ec5fc items=0 ppid=2216 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.262561 kernel: audit: type=1327 audit(1742237022.153:902): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.194000 audit[2451]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.280450 kernel: audit: type=1325 audit(1742237022.194:903): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:42.194000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcf25ec610 a2=0 a3=0 items=0 ppid=2216 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:42.321568 systemd[1]: Created slice kubepods-besteffort-pod4f6014d1_4b3c_453a_8565_2775304aa3ff.slice. Mar 17 18:43:42.452661 kubelet[2083]: I0317 18:43:42.452593 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4f6014d1-4b3c-453a-8565-2775304aa3ff-tigera-ca-bundle\") pod \"calico-typha-86c764d869-v6t24\" (UID: \"4f6014d1-4b3c-453a-8565-2775304aa3ff\") " pod="calico-system/calico-typha-86c764d869-v6t24" Mar 17 18:43:42.453458 kubelet[2083]: I0317 18:43:42.453423 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4f6014d1-4b3c-453a-8565-2775304aa3ff-typha-certs\") pod \"calico-typha-86c764d869-v6t24\" (UID: \"4f6014d1-4b3c-453a-8565-2775304aa3ff\") " pod="calico-system/calico-typha-86c764d869-v6t24" Mar 17 18:43:42.453666 kubelet[2083]: I0317 18:43:42.453629 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dr5sg\" (UniqueName: \"kubernetes.io/projected/4f6014d1-4b3c-453a-8565-2775304aa3ff-kube-api-access-dr5sg\") pod \"calico-typha-86c764d869-v6t24\" (UID: \"4f6014d1-4b3c-453a-8565-2775304aa3ff\") " pod="calico-system/calico-typha-86c764d869-v6t24" Mar 17 18:43:42.625705 systemd[1]: Created slice kubepods-besteffort-poda28bd876_6559_482e_b2d6_ee73c59391ac.slice. Mar 17 18:43:42.631485 env[1222]: time="2025-03-17T18:43:42.630879368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86c764d869-v6t24,Uid:4f6014d1-4b3c-453a-8565-2775304aa3ff,Namespace:calico-system,Attempt:0,}" Mar 17 18:43:42.664095 env[1222]: time="2025-03-17T18:43:42.663999088Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:42.664473 env[1222]: time="2025-03-17T18:43:42.664390244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:42.664668 env[1222]: time="2025-03-17T18:43:42.664629481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:42.665083 env[1222]: time="2025-03-17T18:43:42.665035648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07bc82f17d3c11e768f4fd0d6ee098de5cd0dc15b666718a2e3180a45cf2f302 pid=2461 runtime=io.containerd.runc.v2 Mar 17 18:43:42.711311 systemd[1]: Started cri-containerd-07bc82f17d3c11e768f4fd0d6ee098de5cd0dc15b666718a2e3180a45cf2f302.scope. Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.753000 audit: BPF prog-id=118 op=LOAD Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2461 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626338326631376433633131653736386634666430643665653039 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2461 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626338326631376433633131653736386634666430643665653039 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit: BPF prog-id=119 op=LOAD Mar 17 18:43:42.755000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cc5d0 items=0 ppid=2461 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626338326631376433633131653736386634666430643665653039 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit: BPF prog-id=120 op=LOAD Mar 17 18:43:42.755000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cc618 items=0 ppid=2461 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626338326631376433633131653736386634666430643665653039 Mar 17 18:43:42.755000 audit: BPF prog-id=120 op=UNLOAD Mar 17 18:43:42.755000 audit: BPF prog-id=119 op=UNLOAD Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:42.755000 audit: BPF prog-id=121 op=LOAD Mar 17 18:43:42.755000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cca28 items=0 ppid=2461 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:42.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626338326631376433633131653736386634666430643665653039 Mar 17 18:43:42.762585 kubelet[2083]: I0317 18:43:42.760743 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-xtables-lock\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762585 kubelet[2083]: I0317 18:43:42.760892 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-cni-log-dir\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762585 kubelet[2083]: I0317 18:43:42.760987 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-policysync\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762585 kubelet[2083]: I0317 18:43:42.761051 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2rpq\" (UniqueName: \"kubernetes.io/projected/a28bd876-6559-482e-b2d6-ee73c59391ac-kube-api-access-b2rpq\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762585 kubelet[2083]: I0317 18:43:42.761119 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-cni-bin-dir\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762917 kubelet[2083]: I0317 18:43:42.761149 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-cni-net-dir\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762917 kubelet[2083]: I0317 18:43:42.761213 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a28bd876-6559-482e-b2d6-ee73c59391ac-tigera-ca-bundle\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762917 kubelet[2083]: I0317 18:43:42.761242 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a28bd876-6559-482e-b2d6-ee73c59391ac-node-certs\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762917 kubelet[2083]: I0317 18:43:42.761318 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-lib-modules\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.762917 kubelet[2083]: I0317 18:43:42.761385 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-var-run-calico\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.763202 kubelet[2083]: I0317 18:43:42.761474 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-var-lib-calico\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.763202 kubelet[2083]: I0317 18:43:42.761560 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a28bd876-6559-482e-b2d6-ee73c59391ac-flexvol-driver-host\") pod \"calico-node-99mzh\" (UID: \"a28bd876-6559-482e-b2d6-ee73c59391ac\") " pod="calico-system/calico-node-99mzh" Mar 17 18:43:42.812297 env[1222]: time="2025-03-17T18:43:42.812242286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86c764d869-v6t24,Uid:4f6014d1-4b3c-453a-8565-2775304aa3ff,Namespace:calico-system,Attempt:0,} returns sandbox id \"07bc82f17d3c11e768f4fd0d6ee098de5cd0dc15b666718a2e3180a45cf2f302\"" Mar 17 18:43:42.816285 env[1222]: time="2025-03-17T18:43:42.816237663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 18:43:42.855531 kubelet[2083]: E0317 18:43:42.855463 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:42.861901 kubelet[2083]: I0317 18:43:42.861840 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/eda150f1-13fa-4568-9ac6-402de2737c31-registration-dir\") pod \"csi-node-driver-xnjrg\" (UID: \"eda150f1-13fa-4568-9ac6-402de2737c31\") " pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:42.862129 kubelet[2083]: I0317 18:43:42.861981 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/eda150f1-13fa-4568-9ac6-402de2737c31-varrun\") pod \"csi-node-driver-xnjrg\" (UID: \"eda150f1-13fa-4568-9ac6-402de2737c31\") " pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:42.862129 kubelet[2083]: I0317 18:43:42.862043 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/eda150f1-13fa-4568-9ac6-402de2737c31-kubelet-dir\") pod \"csi-node-driver-xnjrg\" (UID: \"eda150f1-13fa-4568-9ac6-402de2737c31\") " pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:42.862129 kubelet[2083]: I0317 18:43:42.862105 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6hf8\" (UniqueName: \"kubernetes.io/projected/eda150f1-13fa-4568-9ac6-402de2737c31-kube-api-access-p6hf8\") pod \"csi-node-driver-xnjrg\" (UID: \"eda150f1-13fa-4568-9ac6-402de2737c31\") " pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:42.862344 kubelet[2083]: I0317 18:43:42.862167 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/eda150f1-13fa-4568-9ac6-402de2737c31-socket-dir\") pod \"csi-node-driver-xnjrg\" (UID: \"eda150f1-13fa-4568-9ac6-402de2737c31\") " pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:42.863469 kubelet[2083]: E0317 18:43:42.863433 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.863469 kubelet[2083]: W0317 18:43:42.863465 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.863698 kubelet[2083]: E0317 18:43:42.863494 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.863836 kubelet[2083]: E0317 18:43:42.863813 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.863949 kubelet[2083]: W0317 18:43:42.863836 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.863949 kubelet[2083]: E0317 18:43:42.863855 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.866905 kubelet[2083]: E0317 18:43:42.866862 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.866905 kubelet[2083]: W0317 18:43:42.866889 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.867106 kubelet[2083]: E0317 18:43:42.866919 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.867350 kubelet[2083]: E0317 18:43:42.867327 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.867350 kubelet[2083]: W0317 18:43:42.867349 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.867539 kubelet[2083]: E0317 18:43:42.867377 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.869188 kubelet[2083]: E0317 18:43:42.869156 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.869188 kubelet[2083]: W0317 18:43:42.869185 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.869524 kubelet[2083]: E0317 18:43:42.869215 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.870873 kubelet[2083]: E0317 18:43:42.870842 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.870873 kubelet[2083]: W0317 18:43:42.870869 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.871053 kubelet[2083]: E0317 18:43:42.871025 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.871280 kubelet[2083]: E0317 18:43:42.871254 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.871280 kubelet[2083]: W0317 18:43:42.871276 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.871456 kubelet[2083]: E0317 18:43:42.871421 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.871660 kubelet[2083]: E0317 18:43:42.871637 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.871660 kubelet[2083]: W0317 18:43:42.871658 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.871808 kubelet[2083]: E0317 18:43:42.871776 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.872001 kubelet[2083]: E0317 18:43:42.871976 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.872001 kubelet[2083]: W0317 18:43:42.871998 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.872154 kubelet[2083]: E0317 18:43:42.872114 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.872339 kubelet[2083]: E0317 18:43:42.872316 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.872339 kubelet[2083]: W0317 18:43:42.872336 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.872530 kubelet[2083]: E0317 18:43:42.872359 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.872781 kubelet[2083]: E0317 18:43:42.872757 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.872781 kubelet[2083]: W0317 18:43:42.872779 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.872946 kubelet[2083]: E0317 18:43:42.872895 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.873521 kubelet[2083]: E0317 18:43:42.873489 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.873521 kubelet[2083]: W0317 18:43:42.873506 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.873689 kubelet[2083]: E0317 18:43:42.873523 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.878017 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.882514 kubelet[2083]: W0317 18:43:42.878050 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.878079 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.879376 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.882514 kubelet[2083]: W0317 18:43:42.879394 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.879439 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.879847 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.882514 kubelet[2083]: W0317 18:43:42.879862 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.879884 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.882514 kubelet[2083]: E0317 18:43:42.880172 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.883172 kubelet[2083]: W0317 18:43:42.880184 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.883172 kubelet[2083]: E0317 18:43:42.880198 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.894017 kubelet[2083]: E0317 18:43:42.893970 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.894017 kubelet[2083]: W0317 18:43:42.894006 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.894275 kubelet[2083]: E0317 18:43:42.894038 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.929581 env[1222]: time="2025-03-17T18:43:42.929517071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-99mzh,Uid:a28bd876-6559-482e-b2d6-ee73c59391ac,Namespace:calico-system,Attempt:0,}" Mar 17 18:43:42.955071 env[1222]: time="2025-03-17T18:43:42.954960551Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:42.955071 env[1222]: time="2025-03-17T18:43:42.955011669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:42.955071 env[1222]: time="2025-03-17T18:43:42.955030712Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:42.960107 env[1222]: time="2025-03-17T18:43:42.958607407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9 pid=2520 runtime=io.containerd.runc.v2 Mar 17 18:43:42.963303 kubelet[2083]: E0317 18:43:42.963258 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.963303 kubelet[2083]: W0317 18:43:42.963298 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.963616 kubelet[2083]: E0317 18:43:42.963327 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.963802 kubelet[2083]: E0317 18:43:42.963780 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.963901 kubelet[2083]: W0317 18:43:42.963802 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.963901 kubelet[2083]: E0317 18:43:42.963827 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.964276 kubelet[2083]: E0317 18:43:42.964251 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.964276 kubelet[2083]: W0317 18:43:42.964273 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.964479 kubelet[2083]: E0317 18:43:42.964298 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.965331 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.967447 kubelet[2083]: W0317 18:43:42.965361 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.965396 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.965863 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.967447 kubelet[2083]: W0317 18:43:42.965877 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.966021 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.966308 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.967447 kubelet[2083]: W0317 18:43:42.966322 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.966539 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.967447 kubelet[2083]: E0317 18:43:42.966799 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.968150 kubelet[2083]: W0317 18:43:42.966812 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.966955 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.967212 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.968150 kubelet[2083]: W0317 18:43:42.967225 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.967379 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.967648 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.968150 kubelet[2083]: W0317 18:43:42.967661 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.967797 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.968150 kubelet[2083]: E0317 18:43:42.968061 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.968150 kubelet[2083]: W0317 18:43:42.968073 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.968207 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.968532 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.973942 kubelet[2083]: W0317 18:43:42.968546 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.968675 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.968906 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.973942 kubelet[2083]: W0317 18:43:42.968917 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.969033 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.969259 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.973942 kubelet[2083]: W0317 18:43:42.969271 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.973942 kubelet[2083]: E0317 18:43:42.969386 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.969619 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.974581 kubelet[2083]: W0317 18:43:42.969631 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.969751 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.971967 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.974581 kubelet[2083]: W0317 18:43:42.971985 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.972133 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.972364 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.974581 kubelet[2083]: W0317 18:43:42.972378 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.972553 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.974581 kubelet[2083]: E0317 18:43:42.972791 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975108 kubelet[2083]: W0317 18:43:42.972802 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.972926 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.973163 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975108 kubelet[2083]: W0317 18:43:42.973179 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.973291 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.973668 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975108 kubelet[2083]: W0317 18:43:42.973682 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.973824 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975108 kubelet[2083]: E0317 18:43:42.974050 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975108 kubelet[2083]: W0317 18:43:42.974061 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.974215 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.974431 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975694 kubelet[2083]: W0317 18:43:42.974445 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.974587 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.974803 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975694 kubelet[2083]: W0317 18:43:42.974816 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.974970 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.975694 kubelet[2083]: E0317 18:43:42.975630 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.975694 kubelet[2083]: W0317 18:43:42.975653 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.979478 kubelet[2083]: E0317 18:43:42.978807 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.992768 kubelet[2083]: E0317 18:43:42.992514 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.992978 kubelet[2083]: W0317 18:43:42.992771 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.993848 kubelet[2083]: E0317 18:43:42.993760 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:42.998151 kubelet[2083]: E0317 18:43:42.998102 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:42.998151 kubelet[2083]: W0317 18:43:42.998137 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:42.998383 kubelet[2083]: E0317 18:43:42.998172 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:43.017644 systemd[1]: Started cri-containerd-2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9.scope. Mar 17 18:43:43.035198 kubelet[2083]: E0317 18:43:43.035154 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:43.035198 kubelet[2083]: W0317 18:43:43.035188 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:43.035481 kubelet[2083]: E0317 18:43:43.035221 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.120000 audit: BPF prog-id=122 op=LOAD Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303062323631646363366139333632396566336464663136303233 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303062323631646363366139333632396566336464663136303233 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.121000 audit: BPF prog-id=123 op=LOAD Mar 17 18:43:43.121000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0004025c0 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303062323631646363366139333632396566336464663136303233 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit: BPF prog-id=124 op=LOAD Mar 17 18:43:43.122000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000402608 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303062323631646363366139333632396566336464663136303233 Mar 17 18:43:43.122000 audit: BPF prog-id=124 op=UNLOAD Mar 17 18:43:43.122000 audit: BPF prog-id=123 op=UNLOAD Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:43.122000 audit: BPF prog-id=125 op=LOAD Mar 17 18:43:43.122000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000402a18 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303062323631646363366139333632396566336464663136303233 Mar 17 18:43:43.149014 env[1222]: time="2025-03-17T18:43:43.148841371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-99mzh,Uid:a28bd876-6559-482e-b2d6-ee73c59391ac,Namespace:calico-system,Attempt:0,} returns sandbox id \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\"" Mar 17 18:43:43.280000 audit[2581]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:43.280000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffb28f3af0 a2=0 a3=7fffb28f3adc items=0 ppid=2216 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:43.283000 audit[2581]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:43.283000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb28f3af0 a2=0 a3=0 items=0 ppid=2216 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:43.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:44.187735 kubelet[2083]: E0317 18:43:44.187677 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:44.254214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount228937841.mount: Deactivated successfully. Mar 17 18:43:45.210106 env[1222]: time="2025-03-17T18:43:45.210024103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:45.214243 env[1222]: time="2025-03-17T18:43:45.214174992Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:45.216762 env[1222]: time="2025-03-17T18:43:45.216709555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:45.219382 env[1222]: time="2025-03-17T18:43:45.219332585Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:45.220066 env[1222]: time="2025-03-17T18:43:45.220005062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Mar 17 18:43:45.238682 env[1222]: time="2025-03-17T18:43:45.236675291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:43:45.242685 env[1222]: time="2025-03-17T18:43:45.242614223Z" level=info msg="CreateContainer within sandbox \"07bc82f17d3c11e768f4fd0d6ee098de5cd0dc15b666718a2e3180a45cf2f302\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 18:43:45.268610 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1966754435.mount: Deactivated successfully. Mar 17 18:43:45.274574 env[1222]: time="2025-03-17T18:43:45.274439046Z" level=info msg="CreateContainer within sandbox \"07bc82f17d3c11e768f4fd0d6ee098de5cd0dc15b666718a2e3180a45cf2f302\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"af5618d0c0cfc354bb9cda6380ee96c31b234d282d0f72301d67a5e91d0d8bb1\"" Mar 17 18:43:45.277876 env[1222]: time="2025-03-17T18:43:45.277820798Z" level=info msg="StartContainer for \"af5618d0c0cfc354bb9cda6380ee96c31b234d282d0f72301d67a5e91d0d8bb1\"" Mar 17 18:43:45.310537 systemd[1]: Started cri-containerd-af5618d0c0cfc354bb9cda6380ee96c31b234d282d0f72301d67a5e91d0d8bb1.scope. Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.345000 audit: BPF prog-id=126 op=LOAD Mar 17 18:43:45.345000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.345000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2461 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:45.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353631386430633063666333353462623963646136333830656539 Mar 17 18:43:45.345000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.345000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2461 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:45.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353631386430633063666333353462623963646136333830656539 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit: BPF prog-id=127 op=LOAD Mar 17 18:43:45.346000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b8230 items=0 ppid=2461 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:45.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353631386430633063666333353462623963646136333830656539 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit: BPF prog-id=128 op=LOAD Mar 17 18:43:45.346000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b8278 items=0 ppid=2461 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:45.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353631386430633063666333353462623963646136333830656539 Mar 17 18:43:45.346000 audit: BPF prog-id=128 op=UNLOAD Mar 17 18:43:45.346000 audit: BPF prog-id=127 op=UNLOAD Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:45.346000 audit: BPF prog-id=129 op=LOAD Mar 17 18:43:45.346000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8688 items=0 ppid=2461 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:45.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353631386430633063666333353462623963646136333830656539 Mar 17 18:43:45.391229 env[1222]: time="2025-03-17T18:43:45.391146294Z" level=info msg="StartContainer for \"af5618d0c0cfc354bb9cda6380ee96c31b234d282d0f72301d67a5e91d0d8bb1\" returns successfully" Mar 17 18:43:46.189671 kubelet[2083]: E0317 18:43:46.187662 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.292711 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.293960 kubelet[2083]: W0317 18:43:46.292745 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.292781 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.293130 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.293960 kubelet[2083]: W0317 18:43:46.293145 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.293164 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.293476 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.293960 kubelet[2083]: W0317 18:43:46.293489 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.293506 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.293960 kubelet[2083]: E0317 18:43:46.293791 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.294797 kubelet[2083]: W0317 18:43:46.293802 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.294797 kubelet[2083]: E0317 18:43:46.293817 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.296554 kubelet[2083]: E0317 18:43:46.295149 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.296554 kubelet[2083]: W0317 18:43:46.295168 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.296554 kubelet[2083]: E0317 18:43:46.295188 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.296983 kubelet[2083]: E0317 18:43:46.296963 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.297102 kubelet[2083]: W0317 18:43:46.297081 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.297217 kubelet[2083]: E0317 18:43:46.297198 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.298318 kubelet[2083]: E0317 18:43:46.298294 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.298566 kubelet[2083]: W0317 18:43:46.298542 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.298752 kubelet[2083]: E0317 18:43:46.298729 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.300232 kubelet[2083]: E0317 18:43:46.300202 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.300437 kubelet[2083]: W0317 18:43:46.300391 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.300612 kubelet[2083]: E0317 18:43:46.300588 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.301239 kubelet[2083]: E0317 18:43:46.301215 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.301423 kubelet[2083]: W0317 18:43:46.301387 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.301567 kubelet[2083]: E0317 18:43:46.301546 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.301979 kubelet[2083]: E0317 18:43:46.301962 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.302102 kubelet[2083]: W0317 18:43:46.302085 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.302201 kubelet[2083]: E0317 18:43:46.302185 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.302633 kubelet[2083]: E0317 18:43:46.302617 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.302795 kubelet[2083]: W0317 18:43:46.302776 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.302909 kubelet[2083]: E0317 18:43:46.302892 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.303288 kubelet[2083]: E0317 18:43:46.303273 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.303450 kubelet[2083]: W0317 18:43:46.303388 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.303559 kubelet[2083]: E0317 18:43:46.303542 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.304018 kubelet[2083]: E0317 18:43:46.304002 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.304157 kubelet[2083]: W0317 18:43:46.304140 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.304259 kubelet[2083]: E0317 18:43:46.304242 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.308891 kubelet[2083]: E0317 18:43:46.308854 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.309138 kubelet[2083]: W0317 18:43:46.309115 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.309257 kubelet[2083]: E0317 18:43:46.309237 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.309786 kubelet[2083]: E0317 18:43:46.309760 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.309988 kubelet[2083]: W0317 18:43:46.309965 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.310117 kubelet[2083]: E0317 18:43:46.310096 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.310734 kubelet[2083]: E0317 18:43:46.310712 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.310906 kubelet[2083]: W0317 18:43:46.310883 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.311030 kubelet[2083]: E0317 18:43:46.311008 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.311559 kubelet[2083]: E0317 18:43:46.311541 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.311733 kubelet[2083]: W0317 18:43:46.311712 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.311881 kubelet[2083]: E0317 18:43:46.311846 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.312483 kubelet[2083]: E0317 18:43:46.312460 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.312615 kubelet[2083]: W0317 18:43:46.312596 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.312753 kubelet[2083]: E0317 18:43:46.312731 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.313243 kubelet[2083]: E0317 18:43:46.313224 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.313424 kubelet[2083]: W0317 18:43:46.313383 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.313567 kubelet[2083]: E0317 18:43:46.313546 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.314056 kubelet[2083]: E0317 18:43:46.314036 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.314201 kubelet[2083]: W0317 18:43:46.314180 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.314350 kubelet[2083]: E0317 18:43:46.314330 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.316581 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.317962 kubelet[2083]: W0317 18:43:46.316604 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.316633 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.317039 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.317962 kubelet[2083]: W0317 18:43:46.317054 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.317074 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.317473 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.317962 kubelet[2083]: W0317 18:43:46.317489 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.317962 kubelet[2083]: E0317 18:43:46.317506 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.318647 kubelet[2083]: E0317 18:43:46.318591 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.318647 kubelet[2083]: W0317 18:43:46.318619 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.318647 kubelet[2083]: E0317 18:43:46.318637 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319010 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.320046 kubelet[2083]: W0317 18:43:46.319036 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319062 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319415 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.320046 kubelet[2083]: W0317 18:43:46.319451 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319577 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319851 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.320046 kubelet[2083]: W0317 18:43:46.319866 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.320046 kubelet[2083]: E0317 18:43:46.319941 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.321580 kubelet[2083]: E0317 18:43:46.321543 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.321765 kubelet[2083]: W0317 18:43:46.321743 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.321896 kubelet[2083]: E0317 18:43:46.321878 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.322334 kubelet[2083]: E0317 18:43:46.322317 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.322500 kubelet[2083]: W0317 18:43:46.322481 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.322619 kubelet[2083]: E0317 18:43:46.322602 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.323031 kubelet[2083]: E0317 18:43:46.323016 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.323154 kubelet[2083]: W0317 18:43:46.323137 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.323257 kubelet[2083]: E0317 18:43:46.323236 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.324869 kubelet[2083]: E0317 18:43:46.324847 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.325046 kubelet[2083]: W0317 18:43:46.325027 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.325323 kubelet[2083]: E0317 18:43:46.325306 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.325949 kubelet[2083]: E0317 18:43:46.325928 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.326084 kubelet[2083]: W0317 18:43:46.326067 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.326200 kubelet[2083]: E0317 18:43:46.326183 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.327448 kubelet[2083]: E0317 18:43:46.327425 2083 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:43:46.327609 kubelet[2083]: W0317 18:43:46.327589 2083 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:43:46.327806 kubelet[2083]: E0317 18:43:46.327787 2083 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:43:46.602907 env[1222]: time="2025-03-17T18:43:46.602767920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:46.606823 env[1222]: time="2025-03-17T18:43:46.606723531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:46.610391 env[1222]: time="2025-03-17T18:43:46.610303219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:46.614060 env[1222]: time="2025-03-17T18:43:46.613983702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 18:43:46.615615 env[1222]: time="2025-03-17T18:43:46.615557576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:46.618130 env[1222]: time="2025-03-17T18:43:46.618067912Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:43:46.646722 env[1222]: time="2025-03-17T18:43:46.646633549Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69\"" Mar 17 18:43:46.648111 env[1222]: time="2025-03-17T18:43:46.648047289Z" level=info msg="StartContainer for \"6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69\"" Mar 17 18:43:46.692528 systemd[1]: Started cri-containerd-6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69.scope. Mar 17 18:43:46.721000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.721000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fd8e8de6178 items=0 ppid=2520 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323265373662613131656133633530376435353963326135396233 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit: BPF prog-id=130 op=LOAD Mar 17 18:43:46.722000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000218bf8 items=0 ppid=2520 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323265373662613131656133633530376435353963326135396233 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit: BPF prog-id=131 op=LOAD Mar 17 18:43:46.722000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000218c48 items=0 ppid=2520 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323265373662613131656133633530376435353963326135396233 Mar 17 18:43:46.722000 audit: BPF prog-id=131 op=UNLOAD Mar 17 18:43:46.722000 audit: BPF prog-id=130 op=UNLOAD Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:46.722000 audit: BPF prog-id=132 op=LOAD Mar 17 18:43:46.722000 audit[2660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000218cd8 items=0 ppid=2520 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323265373662613131656133633530376435353963326135396233 Mar 17 18:43:46.753349 env[1222]: time="2025-03-17T18:43:46.753255647Z" level=info msg="StartContainer for \"6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69\" returns successfully" Mar 17 18:43:46.773497 systemd[1]: cri-containerd-6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69.scope: Deactivated successfully. Mar 17 18:43:46.774000 audit: BPF prog-id=132 op=UNLOAD Mar 17 18:43:46.813271 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69-rootfs.mount: Deactivated successfully. Mar 17 18:43:47.289771 kubelet[2083]: I0317 18:43:47.289732 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:43:47.310693 kubelet[2083]: I0317 18:43:47.310602 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-86c764d869-v6t24" podStartSLOduration=2.904435022 podStartE2EDuration="5.310576356s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:43:42.815302058 +0000 UTC m=+12.868259383" lastFinishedPulling="2025-03-17 18:43:45.221443396 +0000 UTC m=+15.274400717" observedRunningTime="2025-03-17 18:43:46.308729853 +0000 UTC m=+16.361687185" watchObservedRunningTime="2025-03-17 18:43:47.310576356 +0000 UTC m=+17.363533686" Mar 17 18:43:47.411709 env[1222]: time="2025-03-17T18:43:47.411233234Z" level=info msg="shim disconnected" id=6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69 Mar 17 18:43:47.411709 env[1222]: time="2025-03-17T18:43:47.411302580Z" level=warning msg="cleaning up after shim disconnected" id=6b22e76ba11ea3c507d559c2a59b3bb826aa4ae6def50a355eea1aa17e367f69 namespace=k8s.io Mar 17 18:43:47.411709 env[1222]: time="2025-03-17T18:43:47.411319452Z" level=info msg="cleaning up dead shim" Mar 17 18:43:47.425685 env[1222]: time="2025-03-17T18:43:47.425603043Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:43:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2702 runtime=io.containerd.runc.v2\n" Mar 17 18:43:48.186895 kubelet[2083]: E0317 18:43:48.186822 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:48.297934 env[1222]: time="2025-03-17T18:43:48.296512499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:43:50.187634 kubelet[2083]: E0317 18:43:50.187571 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:52.190243 kubelet[2083]: E0317 18:43:52.190168 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:53.109975 env[1222]: time="2025-03-17T18:43:53.109863293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:53.114085 env[1222]: time="2025-03-17T18:43:53.114028258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:53.117325 env[1222]: time="2025-03-17T18:43:53.117267485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:53.120226 env[1222]: time="2025-03-17T18:43:53.120163960Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:53.121539 env[1222]: time="2025-03-17T18:43:53.121463493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 18:43:53.126632 env[1222]: time="2025-03-17T18:43:53.126560030Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:43:53.158529 env[1222]: time="2025-03-17T18:43:53.158446810Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a\"" Mar 17 18:43:53.159961 env[1222]: time="2025-03-17T18:43:53.159908535Z" level=info msg="StartContainer for \"4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a\"" Mar 17 18:43:53.201978 systemd[1]: Started cri-containerd-4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a.scope. Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.234714 kernel: kauditd_printk_skb: 223 callbacks suppressed Mar 17 18:43:53.234897 kernel: audit: type=1400 audit(1742237033.227:967): avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6b118c32f8 items=0 ppid=2520 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:53.293450 kernel: audit: type=1300 audit(1742237033.227:967): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6b118c32f8 items=0 ppid=2520 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:53.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393837636338663933333963653166633535663061303032323965 Mar 17 18:43:53.329526 kernel: audit: type=1327 audit(1742237033.227:967): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393837636338663933333963653166633535663061303032323965 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.332335 env[1222]: time="2025-03-17T18:43:53.332280684Z" level=info msg="StartContainer for \"4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a\" returns successfully" Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.373610 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.373837 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.373903 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.395479 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.438031 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.460451 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.227000 audit: BPF prog-id=133 op=LOAD Mar 17 18:43:53.227000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000244b8 items=0 ppid=2520 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:53.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393837636338663933333963653166633535663061303032323965 Mar 17 18:43:53.482459 kernel: audit: type=1400 audit(1742237033.227:968): avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.255000 audit: BPF prog-id=134 op=LOAD Mar 17 18:43:53.255000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024508 items=0 ppid=2520 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:53.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393837636338663933333963653166633535663061303032323965 Mar 17 18:43:53.256000 audit: BPF prog-id=134 op=UNLOAD Mar 17 18:43:53.256000 audit: BPF prog-id=133 op=UNLOAD Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:53.256000 audit: BPF prog-id=135 op=LOAD Mar 17 18:43:53.256000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024598 items=0 ppid=2520 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:53.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393837636338663933333963653166633535663061303032323965 Mar 17 18:43:54.187241 kubelet[2083]: E0317 18:43:54.187177 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:54.313645 env[1222]: time="2025-03-17T18:43:54.313562319Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:43:54.317060 systemd[1]: cri-containerd-4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a.scope: Deactivated successfully. Mar 17 18:43:54.319000 audit: BPF prog-id=135 op=UNLOAD Mar 17 18:43:54.364265 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a-rootfs.mount: Deactivated successfully. Mar 17 18:43:54.379813 kubelet[2083]: I0317 18:43:54.378271 2083 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Mar 17 18:43:54.427842 systemd[1]: Created slice kubepods-burstable-pod9288f0af_cbe0_428a_9ea2_660d440794e8.slice. Mar 17 18:43:54.432554 kubelet[2083]: W0317 18:43:54.432487 2083 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' and this object Mar 17 18:43:54.432968 kubelet[2083]: E0317 18:43:54.432910 2083 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' and this object" logger="UnhandledError" Mar 17 18:43:54.460237 systemd[1]: Created slice kubepods-besteffort-pod4b1d5a2a_cbd3_47f6_b41e_827638039dfd.slice. Mar 17 18:43:54.468743 systemd[1]: Created slice kubepods-burstable-poda63c5f49_7ec7_47bb_ad9e_77a20d2eb0bd.slice. Mar 17 18:43:54.481949 systemd[1]: Created slice kubepods-besteffort-podc4025da7_6b6d_4efc_b29e_75e68b9ec285.slice. Mar 17 18:43:54.494381 systemd[1]: Created slice kubepods-besteffort-pod296922d6_2029_455a_8726_e8a75a73aaad.slice. Mar 17 18:43:54.496365 kubelet[2083]: I0317 18:43:54.496321 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9288f0af-cbe0-428a-9ea2-660d440794e8-config-volume\") pod \"coredns-6f6b679f8f-58v75\" (UID: \"9288f0af-cbe0-428a-9ea2-660d440794e8\") " pod="kube-system/coredns-6f6b679f8f-58v75" Mar 17 18:43:54.496675 kubelet[2083]: I0317 18:43:54.496637 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c4025da7-6b6d-4efc-b29e-75e68b9ec285-tigera-ca-bundle\") pod \"calico-kube-controllers-59d85f849c-tbgkt\" (UID: \"c4025da7-6b6d-4efc-b29e-75e68b9ec285\") " pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" Mar 17 18:43:54.496840 kubelet[2083]: I0317 18:43:54.496817 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjkbm\" (UniqueName: \"kubernetes.io/projected/a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd-kube-api-access-tjkbm\") pod \"coredns-6f6b679f8f-k4skw\" (UID: \"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd\") " pod="kube-system/coredns-6f6b679f8f-k4skw" Mar 17 18:43:54.496990 kubelet[2083]: I0317 18:43:54.496968 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ll2t4\" (UniqueName: \"kubernetes.io/projected/296922d6-2029-455a-8726-e8a75a73aaad-kube-api-access-ll2t4\") pod \"calico-apiserver-77588b4d96-2qpnh\" (UID: \"296922d6-2029-455a-8726-e8a75a73aaad\") " pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" Mar 17 18:43:54.497127 kubelet[2083]: I0317 18:43:54.497107 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd-config-volume\") pod \"coredns-6f6b679f8f-k4skw\" (UID: \"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd\") " pod="kube-system/coredns-6f6b679f8f-k4skw" Mar 17 18:43:54.497277 kubelet[2083]: I0317 18:43:54.497255 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/296922d6-2029-455a-8726-e8a75a73aaad-calico-apiserver-certs\") pod \"calico-apiserver-77588b4d96-2qpnh\" (UID: \"296922d6-2029-455a-8726-e8a75a73aaad\") " pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" Mar 17 18:43:54.497450 kubelet[2083]: I0317 18:43:54.497397 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-59ldh\" (UniqueName: \"kubernetes.io/projected/4b1d5a2a-cbd3-47f6-b41e-827638039dfd-kube-api-access-59ldh\") pod \"calico-apiserver-77588b4d96-djlk9\" (UID: \"4b1d5a2a-cbd3-47f6-b41e-827638039dfd\") " pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" Mar 17 18:43:54.497618 kubelet[2083]: I0317 18:43:54.497592 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxp6n\" (UniqueName: \"kubernetes.io/projected/9288f0af-cbe0-428a-9ea2-660d440794e8-kube-api-access-vxp6n\") pod \"coredns-6f6b679f8f-58v75\" (UID: \"9288f0af-cbe0-428a-9ea2-660d440794e8\") " pod="kube-system/coredns-6f6b679f8f-58v75" Mar 17 18:43:54.497787 kubelet[2083]: I0317 18:43:54.497761 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vb8vr\" (UniqueName: \"kubernetes.io/projected/c4025da7-6b6d-4efc-b29e-75e68b9ec285-kube-api-access-vb8vr\") pod \"calico-kube-controllers-59d85f849c-tbgkt\" (UID: \"c4025da7-6b6d-4efc-b29e-75e68b9ec285\") " pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" Mar 17 18:43:54.497953 kubelet[2083]: I0317 18:43:54.497930 2083 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4b1d5a2a-cbd3-47f6-b41e-827638039dfd-calico-apiserver-certs\") pod \"calico-apiserver-77588b4d96-djlk9\" (UID: \"4b1d5a2a-cbd3-47f6-b41e-827638039dfd\") " pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" Mar 17 18:43:54.766937 env[1222]: time="2025-03-17T18:43:54.766855879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-djlk9,Uid:4b1d5a2a-cbd3-47f6-b41e-827638039dfd,Namespace:calico-apiserver,Attempt:0,}" Mar 17 18:43:54.789602 env[1222]: time="2025-03-17T18:43:54.789538432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59d85f849c-tbgkt,Uid:c4025da7-6b6d-4efc-b29e-75e68b9ec285,Namespace:calico-system,Attempt:0,}" Mar 17 18:43:54.824867 env[1222]: time="2025-03-17T18:43:54.824793357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-2qpnh,Uid:296922d6-2029-455a-8726-e8a75a73aaad,Namespace:calico-apiserver,Attempt:0,}" Mar 17 18:43:55.142766 env[1222]: time="2025-03-17T18:43:55.142288563Z" level=info msg="shim disconnected" id=4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a Mar 17 18:43:55.142766 env[1222]: time="2025-03-17T18:43:55.142594740Z" level=warning msg="cleaning up after shim disconnected" id=4e987cc8f9339ce1fc55f0a00229e584b354daf403e42355c97c57f856c7414a namespace=k8s.io Mar 17 18:43:55.142766 env[1222]: time="2025-03-17T18:43:55.142613564Z" level=info msg="cleaning up dead shim" Mar 17 18:43:55.166907 env[1222]: time="2025-03-17T18:43:55.166825912Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:43:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2773 runtime=io.containerd.runc.v2\n" Mar 17 18:43:55.331699 env[1222]: time="2025-03-17T18:43:55.331587196Z" level=error msg="Failed to destroy network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.332877 env[1222]: time="2025-03-17T18:43:55.332809193Z" level=error msg="encountered an error cleaning up failed sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.334912 env[1222]: time="2025-03-17T18:43:55.334836861Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-djlk9,Uid:4b1d5a2a-cbd3-47f6-b41e-827638039dfd,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.336211 kubelet[2083]: E0317 18:43:55.335630 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.336211 kubelet[2083]: E0317 18:43:55.335747 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" Mar 17 18:43:55.336211 kubelet[2083]: E0317 18:43:55.335784 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" Mar 17 18:43:55.337057 kubelet[2083]: E0317 18:43:55.335847 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77588b4d96-djlk9_calico-apiserver(4b1d5a2a-cbd3-47f6-b41e-827638039dfd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77588b4d96-djlk9_calico-apiserver(4b1d5a2a-cbd3-47f6-b41e-827638039dfd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" podUID="4b1d5a2a-cbd3-47f6-b41e-827638039dfd" Mar 17 18:43:55.375582 kubelet[2083]: I0317 18:43:55.360584 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:43:55.387450 env[1222]: time="2025-03-17T18:43:55.376163438Z" level=info msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" Mar 17 18:43:55.387450 env[1222]: time="2025-03-17T18:43:55.376163435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:43:55.414621 env[1222]: time="2025-03-17T18:43:55.414451567Z" level=error msg="Failed to destroy network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.427585 env[1222]: time="2025-03-17T18:43:55.415070843Z" level=error msg="Failed to destroy network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.427585 env[1222]: time="2025-03-17T18:43:55.416995701Z" level=error msg="encountered an error cleaning up failed sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.427585 env[1222]: time="2025-03-17T18:43:55.417096653Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59d85f849c-tbgkt,Uid:c4025da7-6b6d-4efc-b29e-75e68b9ec285,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.427585 env[1222]: time="2025-03-17T18:43:55.420825432Z" level=error msg="encountered an error cleaning up failed sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.427585 env[1222]: time="2025-03-17T18:43:55.420996215Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-2qpnh,Uid:296922d6-2029-455a-8726-e8a75a73aaad,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.425821 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54-shm.mount: Deactivated successfully. Mar 17 18:43:55.428570 kubelet[2083]: E0317 18:43:55.417465 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.428570 kubelet[2083]: E0317 18:43:55.417559 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" Mar 17 18:43:55.428570 kubelet[2083]: E0317 18:43:55.417617 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" Mar 17 18:43:55.425993 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4-shm.mount: Deactivated successfully. Mar 17 18:43:55.428875 kubelet[2083]: E0317 18:43:55.417696 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-59d85f849c-tbgkt_calico-system(c4025da7-6b6d-4efc-b29e-75e68b9ec285)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-59d85f849c-tbgkt_calico-system(c4025da7-6b6d-4efc-b29e-75e68b9ec285)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" podUID="c4025da7-6b6d-4efc-b29e-75e68b9ec285" Mar 17 18:43:55.428875 kubelet[2083]: E0317 18:43:55.421335 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.428875 kubelet[2083]: E0317 18:43:55.421450 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" Mar 17 18:43:55.429101 kubelet[2083]: E0317 18:43:55.421506 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" Mar 17 18:43:55.429101 kubelet[2083]: E0317 18:43:55.421564 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77588b4d96-2qpnh_calico-apiserver(296922d6-2029-455a-8726-e8a75a73aaad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77588b4d96-2qpnh_calico-apiserver(296922d6-2029-455a-8726-e8a75a73aaad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" podUID="296922d6-2029-455a-8726-e8a75a73aaad" Mar 17 18:43:55.445140 kubelet[2083]: I0317 18:43:55.444440 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:43:55.495913 env[1222]: time="2025-03-17T18:43:55.495829370Z" level=error msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" failed" error="failed to destroy network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.496262 kubelet[2083]: E0317 18:43:55.496208 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:43:55.496433 kubelet[2083]: E0317 18:43:55.496296 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8"} Mar 17 18:43:55.496433 kubelet[2083]: E0317 18:43:55.496384 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b1d5a2a-cbd3-47f6-b41e-827638039dfd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:55.496624 kubelet[2083]: E0317 18:43:55.496469 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b1d5a2a-cbd3-47f6-b41e-827638039dfd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" podUID="4b1d5a2a-cbd3-47f6-b41e-827638039dfd" Mar 17 18:43:55.507000 audit[2903]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:55.507000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdad1582b0 a2=0 a3=7ffdad15829c items=0 ppid=2216 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:55.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:55.511000 audit[2903]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:55.511000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdad1582b0 a2=0 a3=7ffdad15829c items=0 ppid=2216 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:55.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:55.640698 env[1222]: time="2025-03-17T18:43:55.640635643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-58v75,Uid:9288f0af-cbe0-428a-9ea2-660d440794e8,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:55.677701 env[1222]: time="2025-03-17T18:43:55.677531622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k4skw,Uid:a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd,Namespace:kube-system,Attempt:0,}" Mar 17 18:43:55.792594 env[1222]: time="2025-03-17T18:43:55.792522275Z" level=error msg="Failed to destroy network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.793231 env[1222]: time="2025-03-17T18:43:55.793187352Z" level=error msg="encountered an error cleaning up failed sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.793463 env[1222]: time="2025-03-17T18:43:55.793396071Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-58v75,Uid:9288f0af-cbe0-428a-9ea2-660d440794e8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.793980 kubelet[2083]: E0317 18:43:55.793928 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.794131 kubelet[2083]: E0317 18:43:55.794030 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-58v75" Mar 17 18:43:55.794131 kubelet[2083]: E0317 18:43:55.794093 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-58v75" Mar 17 18:43:55.794325 kubelet[2083]: E0317 18:43:55.794175 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-58v75_kube-system(9288f0af-cbe0-428a-9ea2-660d440794e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-58v75_kube-system(9288f0af-cbe0-428a-9ea2-660d440794e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-58v75" podUID="9288f0af-cbe0-428a-9ea2-660d440794e8" Mar 17 18:43:55.816335 env[1222]: time="2025-03-17T18:43:55.816258320Z" level=error msg="Failed to destroy network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.816813 env[1222]: time="2025-03-17T18:43:55.816752716Z" level=error msg="encountered an error cleaning up failed sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.816966 env[1222]: time="2025-03-17T18:43:55.816849400Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k4skw,Uid:a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.817254 kubelet[2083]: E0317 18:43:55.817174 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:55.817397 kubelet[2083]: E0317 18:43:55.817256 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k4skw" Mar 17 18:43:55.817397 kubelet[2083]: E0317 18:43:55.817288 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k4skw" Mar 17 18:43:55.817397 kubelet[2083]: E0317 18:43:55.817345 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-k4skw_kube-system(a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-k4skw_kube-system(a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k4skw" podUID="a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd" Mar 17 18:43:56.197884 systemd[1]: Created slice kubepods-besteffort-podeda150f1_13fa_4568_9ac6_402de2737c31.slice. Mar 17 18:43:56.202316 env[1222]: time="2025-03-17T18:43:56.202243204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xnjrg,Uid:eda150f1-13fa-4568-9ac6-402de2737c31,Namespace:calico-system,Attempt:0,}" Mar 17 18:43:56.320335 env[1222]: time="2025-03-17T18:43:56.320234399Z" level=error msg="Failed to destroy network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.320918 env[1222]: time="2025-03-17T18:43:56.320840636Z" level=error msg="encountered an error cleaning up failed sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.321058 env[1222]: time="2025-03-17T18:43:56.320938845Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xnjrg,Uid:eda150f1-13fa-4568-9ac6-402de2737c31,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.321855 kubelet[2083]: E0317 18:43:56.321306 2083 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.321855 kubelet[2083]: E0317 18:43:56.321388 2083 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:56.321855 kubelet[2083]: E0317 18:43:56.321458 2083 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xnjrg" Mar 17 18:43:56.322151 kubelet[2083]: E0317 18:43:56.321524 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xnjrg_calico-system(eda150f1-13fa-4568-9ac6-402de2737c31)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xnjrg_calico-system(eda150f1-13fa-4568-9ac6-402de2737c31)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:56.369656 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8-shm.mount: Deactivated successfully. Mar 17 18:43:56.369806 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215-shm.mount: Deactivated successfully. Mar 17 18:43:56.379209 kubelet[2083]: I0317 18:43:56.378066 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:43:56.381865 env[1222]: time="2025-03-17T18:43:56.381808769Z" level=info msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" Mar 17 18:43:56.393217 kubelet[2083]: I0317 18:43:56.392454 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:43:56.393757 env[1222]: time="2025-03-17T18:43:56.393703954Z" level=info msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" Mar 17 18:43:56.404096 kubelet[2083]: I0317 18:43:56.400947 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:43:56.404293 env[1222]: time="2025-03-17T18:43:56.402214103Z" level=info msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" Mar 17 18:43:56.414183 kubelet[2083]: I0317 18:43:56.414125 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:43:56.415256 env[1222]: time="2025-03-17T18:43:56.415205256Z" level=info msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" Mar 17 18:43:56.423052 kubelet[2083]: I0317 18:43:56.420372 2083 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:43:56.423246 env[1222]: time="2025-03-17T18:43:56.421605199Z" level=info msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" Mar 17 18:43:56.556772 env[1222]: time="2025-03-17T18:43:56.556692726Z" level=error msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" failed" error="failed to destroy network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.558853 env[1222]: time="2025-03-17T18:43:56.557135158Z" level=error msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" failed" error="failed to destroy network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.559697 kubelet[2083]: E0317 18:43:56.559370 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:43:56.559697 kubelet[2083]: E0317 18:43:56.559469 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4"} Mar 17 18:43:56.559697 kubelet[2083]: E0317 18:43:56.559364 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:43:56.559697 kubelet[2083]: E0317 18:43:56.559544 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"296922d6-2029-455a-8726-e8a75a73aaad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:56.559697 kubelet[2083]: E0317 18:43:56.559550 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8"} Mar 17 18:43:56.560165 kubelet[2083]: E0317 18:43:56.559629 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"296922d6-2029-455a-8726-e8a75a73aaad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" podUID="296922d6-2029-455a-8726-e8a75a73aaad" Mar 17 18:43:56.560165 kubelet[2083]: E0317 18:43:56.559664 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:56.560165 kubelet[2083]: E0317 18:43:56.559717 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k4skw" podUID="a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd" Mar 17 18:43:56.588211 env[1222]: time="2025-03-17T18:43:56.588118336Z" level=error msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" failed" error="failed to destroy network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.588887 kubelet[2083]: E0317 18:43:56.588816 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:43:56.589171 kubelet[2083]: E0317 18:43:56.588910 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54"} Mar 17 18:43:56.589171 kubelet[2083]: E0317 18:43:56.588962 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4025da7-6b6d-4efc-b29e-75e68b9ec285\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:56.589171 kubelet[2083]: E0317 18:43:56.588998 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4025da7-6b6d-4efc-b29e-75e68b9ec285\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" podUID="c4025da7-6b6d-4efc-b29e-75e68b9ec285" Mar 17 18:43:56.663813 env[1222]: time="2025-03-17T18:43:56.663720932Z" level=error msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" failed" error="failed to destroy network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.664106 kubelet[2083]: E0317 18:43:56.664055 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:43:56.664251 kubelet[2083]: E0317 18:43:56.664130 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692"} Mar 17 18:43:56.664251 kubelet[2083]: E0317 18:43:56.664183 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eda150f1-13fa-4568-9ac6-402de2737c31\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:56.664251 kubelet[2083]: E0317 18:43:56.664225 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eda150f1-13fa-4568-9ac6-402de2737c31\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xnjrg" podUID="eda150f1-13fa-4568-9ac6-402de2737c31" Mar 17 18:43:56.665535 env[1222]: time="2025-03-17T18:43:56.665454945Z" level=error msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" failed" error="failed to destroy network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:43:56.665815 kubelet[2083]: E0317 18:43:56.665757 2083 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:43:56.665962 kubelet[2083]: E0317 18:43:56.665824 2083 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215"} Mar 17 18:43:56.665962 kubelet[2083]: E0317 18:43:56.665872 2083 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9288f0af-cbe0-428a-9ea2-660d440794e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:43:56.665962 kubelet[2083]: E0317 18:43:56.665908 2083 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9288f0af-cbe0-428a-9ea2-660d440794e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-58v75" podUID="9288f0af-cbe0-428a-9ea2-660d440794e8" Mar 17 18:44:02.919078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3871625808.mount: Deactivated successfully. Mar 17 18:44:02.964932 env[1222]: time="2025-03-17T18:44:02.964857790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:02.968550 env[1222]: time="2025-03-17T18:44:02.968399264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:02.970864 env[1222]: time="2025-03-17T18:44:02.970809181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:02.974063 env[1222]: time="2025-03-17T18:44:02.974014025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:02.974782 env[1222]: time="2025-03-17T18:44:02.974735106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 18:44:03.004811 env[1222]: time="2025-03-17T18:44:03.004751561Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:44:03.041512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3915246935.mount: Deactivated successfully. Mar 17 18:44:03.049095 env[1222]: time="2025-03-17T18:44:03.049005172Z" level=info msg="CreateContainer within sandbox \"2d00b261dcc6a93629ef3ddf1602331c2f113c4bc5d9ff20a80f7252faab76f9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135\"" Mar 17 18:44:03.052059 env[1222]: time="2025-03-17T18:44:03.051978552Z" level=info msg="StartContainer for \"224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135\"" Mar 17 18:44:03.084786 systemd[1]: Started cri-containerd-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135.scope. Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.126084 kernel: kauditd_printk_skb: 40 callbacks suppressed Mar 17 18:44:03.126304 kernel: audit: type=1400 audit(1742237043.118:976): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.180735 kernel: audit: type=1300 audit(1742237043.118:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f827cc88d88 items=0 ppid=2520 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:03.118000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f827cc88d88 items=0 ppid=2520 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:03.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232346666646662383463616434306633356365353961353737623631 Mar 17 18:44:03.232520 kernel: audit: type=1327 audit(1742237043.118:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232346666646662383463616434306633356365353961353737623631 Mar 17 18:44:03.232717 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.254365 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.275496 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.275607 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.277466 env[1222]: time="2025-03-17T18:44:03.277386922Z" level=info msg="StartContainer for \"224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135\" returns successfully" Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.318195 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.339443 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.339603 kernel: audit: type=1400 audit(1742237043.118:977): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.118000 audit: BPF prog-id=136 op=LOAD Mar 17 18:44:03.118000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0df8 items=0 ppid=2520 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:03.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232346666646662383463616434306633356365353961353737623631 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit: BPF prog-id=137 op=LOAD Mar 17 18:44:03.146000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0e48 items=0 ppid=2520 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:03.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232346666646662383463616434306633356365353961353737623631 Mar 17 18:44:03.146000 audit: BPF prog-id=137 op=UNLOAD Mar 17 18:44:03.146000 audit: BPF prog-id=136 op=UNLOAD Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:03.146000 audit: BPF prog-id=138 op=LOAD Mar 17 18:44:03.146000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0ed8 items=0 ppid=2520 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:03.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232346666646662383463616434306633356365353961353737623631 Mar 17 18:44:03.431620 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:44:03.431826 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:44:03.478211 kubelet[2083]: I0317 18:44:03.478108 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-99mzh" podStartSLOduration=1.659482042 podStartE2EDuration="21.478061059s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:43:43.158015358 +0000 UTC m=+13.210972669" lastFinishedPulling="2025-03-17 18:44:02.976594358 +0000 UTC m=+33.029551686" observedRunningTime="2025-03-17 18:44:03.474392672 +0000 UTC m=+33.527350013" watchObservedRunningTime="2025-03-17 18:44:03.478061059 +0000 UTC m=+33.531018390" Mar 17 18:44:04.476549 systemd[1]: run-containerd-runc-k8s.io-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135-runc.y0JjRP.mount: Deactivated successfully. Mar 17 18:44:04.895000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=24603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.906000 audit[3258]: AVC avc: denied { write } for pid=3258 comm="tee" name="fd" dev="proc" ino=24448 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.906000 audit[3258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe420dc9c8 a2=241 a3=1b6 items=1 ppid=3225 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.906000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:44:04.906000 audit: PATH item=0 name="/dev/fd/63" inode=24591 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.906000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.910000 audit[3260]: AVC avc: denied { write } for pid=3260 comm="tee" name="fd" dev="proc" ino=24618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.910000 audit[3260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb2f2f9b8 a2=241 a3=1b6 items=1 ppid=3232 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.910000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:44:04.910000 audit: PATH item=0 name="/dev/fd/63" inode=24598 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.910000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.895000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeffc7f9c9 a2=241 a3=1b6 items=1 ppid=3229 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.895000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:44:04.895000 audit: PATH item=0 name="/dev/fd/63" inode=24586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.895000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.917000 audit[3266]: AVC avc: denied { write } for pid=3266 comm="tee" name="fd" dev="proc" ino=24622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.926000 audit[3263]: AVC avc: denied { write } for pid=3263 comm="tee" name="fd" dev="proc" ino=24457 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.926000 audit[3263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcda13f9c8 a2=241 a3=1b6 items=1 ppid=3221 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.926000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:44:04.926000 audit: PATH item=0 name="/dev/fd/63" inode=24614 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.926000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.917000 audit[3266]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd33219c8 a2=241 a3=1b6 items=1 ppid=3223 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.917000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:44:04.917000 audit: PATH item=0 name="/dev/fd/63" inode=24617 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.917000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.937000 audit[3284]: AVC avc: denied { write } for pid=3284 comm="tee" name="fd" dev="proc" ino=24631 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.969000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=24468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:44:04.969000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecce599b9 a2=241 a3=1b6 items=1 ppid=3238 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.969000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:44:04.969000 audit: PATH item=0 name="/dev/fd/63" inode=24460 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:04.937000 audit[3284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1f1779ca a2=241 a3=1b6 items=1 ppid=3227 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:04.937000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:44:04.937000 audit: PATH item=0 name="/dev/fd/63" inode=24627 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:44:04.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.295000 audit: BPF prog-id=139 op=LOAD Mar 17 18:44:05.295000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff892be0b0 a2=98 a3=3 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.296000 audit: BPF prog-id=139 op=UNLOAD Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit: BPF prog-id=140 op=LOAD Mar 17 18:44:05.296000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff892bde90 a2=74 a3=540051 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.296000 audit: BPF prog-id=140 op=UNLOAD Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.296000 audit: BPF prog-id=141 op=LOAD Mar 17 18:44:05.296000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff892bdec0 a2=94 a3=2 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.297000 audit: BPF prog-id=141 op=UNLOAD Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit: BPF prog-id=142 op=LOAD Mar 17 18:44:05.430000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff892bdd80 a2=40 a3=1 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.430000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.430000 audit: BPF prog-id=142 op=UNLOAD Mar 17 18:44:05.430000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.430000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff892bde50 a2=50 a3=7fff892bdf30 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.430000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bdd90 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff892bddc0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff892bdcd0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bdde0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bddc0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bddb0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bdde0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff892bddc0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff892bdde0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff892bddb0 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff892bde20 a2=28 a3=0 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.443000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff892bdbd0 a2=50 a3=1 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.443000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit: BPF prog-id=143 op=LOAD Mar 17 18:44:05.444000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff892bdbd0 a2=94 a3=5 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.444000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.444000 audit: BPF prog-id=143 op=UNLOAD Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff892bdc80 a2=50 a3=1 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.444000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.444000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff892bdda0 a2=4 a3=38 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.444000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.448000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:44:05.448000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff892bddf0 a2=94 a3=6 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:44:05.450000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff892bd5a0 a2=94 a3=83 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.450000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.450000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:44:05.450000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff892bd5a0 a2=94 a3=83 items=0 ppid=3226 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.450000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit: BPF prog-id=144 op=LOAD Mar 17 18:44:05.476000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb64bca00 a2=98 a3=1999999999999999 items=0 ppid=3226 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.476000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:44:05.476000 audit: BPF prog-id=144 op=UNLOAD Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit: BPF prog-id=145 op=LOAD Mar 17 18:44:05.476000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb64bc8e0 a2=74 a3=ffff items=0 ppid=3226 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.476000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:44:05.476000 audit: BPF prog-id=145 op=UNLOAD Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.476000 audit: BPF prog-id=146 op=LOAD Mar 17 18:44:05.476000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb64bc920 a2=40 a3=7ffeb64bcb00 items=0 ppid=3226 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.476000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:44:05.476000 audit: BPF prog-id=146 op=UNLOAD Mar 17 18:44:05.483659 systemd[1]: run-containerd-runc-k8s.io-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135-runc.ibsFlX.mount: Deactivated successfully. Mar 17 18:44:05.611191 systemd-networkd[1027]: vxlan.calico: Link UP Mar 17 18:44:05.611205 systemd-networkd[1027]: vxlan.calico: Gained carrier Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.662000 audit: BPF prog-id=147 op=LOAD Mar 17 18:44:05.662000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeed6d4ca0 a2=98 a3=ffffffff items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.663000 audit: BPF prog-id=147 op=UNLOAD Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.664000 audit: BPF prog-id=148 op=LOAD Mar 17 18:44:05.664000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeed6d4ab0 a2=74 a3=540051 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.664000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit: BPF prog-id=148 op=UNLOAD Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit: BPF prog-id=149 op=LOAD Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeed6d4ae0 a2=94 a3=2 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit: BPF prog-id=149 op=UNLOAD Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d49b0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed6d49e0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed6d48f0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d4a00 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d49e0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d49d0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d4a00 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed6d49e0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed6d4a00 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed6d49d0 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.665000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.665000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeed6d4a40 a2=28 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.665000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.666000 audit: BPF prog-id=150 op=LOAD Mar 17 18:44:05.666000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeed6d48b0 a2=40 a3=0 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.666000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.666000 audit: BPF prog-id=150 op=UNLOAD Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffeed6d48a0 a2=50 a3=2800 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffeed6d48a0 a2=50 a3=2800 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit: BPF prog-id=151 op=LOAD Mar 17 18:44:05.668000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeed6d40c0 a2=94 a3=2 items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.668000 audit: BPF prog-id=151 op=UNLOAD Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.668000 audit: BPF prog-id=152 op=LOAD Mar 17 18:44:05.668000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeed6d41c0 a2=94 a3=2d items=0 ppid=3226 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.678000 audit: BPF prog-id=153 op=LOAD Mar 17 18:44:05.678000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff843390c0 a2=98 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.678000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.678000 audit: BPF prog-id=153 op=UNLOAD Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit: BPF prog-id=154 op=LOAD Mar 17 18:44:05.679000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84338ea0 a2=74 a3=540051 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.679000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.679000 audit: BPF prog-id=154 op=UNLOAD Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.679000 audit: BPF prog-id=155 op=LOAD Mar 17 18:44:05.679000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84338ed0 a2=94 a3=2 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.679000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.679000 audit: BPF prog-id=155 op=UNLOAD Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit: BPF prog-id=156 op=LOAD Mar 17 18:44:05.824000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84338d90 a2=40 a3=1 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.824000 audit: BPF prog-id=156 op=UNLOAD Mar 17 18:44:05.824000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.824000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff84338e60 a2=50 a3=7fff84338f40 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338da0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84338dd0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84338ce0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338df0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338dd0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338dc0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338df0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84338dd0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84338df0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84338dc0 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84338e30 a2=28 a3=0 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff84338be0 a2=50 a3=1 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit: BPF prog-id=157 op=LOAD Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff84338be0 a2=94 a3=5 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit: BPF prog-id=157 op=UNLOAD Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff84338c90 a2=50 a3=1 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff84338db0 a2=4 a3=38 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.837000 audit[3388]: AVC avc: denied { confidentiality } for pid=3388 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:44:05.837000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff84338e00 a2=94 a3=6 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { confidentiality } for pid=3388 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:44:05.838000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff843385b0 a2=94 a3=83 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.838000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff843385b0 a2=94 a3=83 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.839000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.839000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84339ff0 a2=10 a3=f1f00800 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.839000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.839000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84339e90 a2=10 a3=3 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.839000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.839000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84339e30 a2=10 a3=3 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.839000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:05.839000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84339e30 a2=10 a3=7 items=0 ppid=3226 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:44:05.849000 audit: BPF prog-id=152 op=UNLOAD Mar 17 18:44:05.925000 audit[3414]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:05.925000 audit[3414]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdd1921630 a2=0 a3=7ffdd192161c items=0 ppid=3226 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.925000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:05.956000 audit[3415]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:05.956000 audit[3415]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd7f463560 a2=0 a3=7ffd7f46354c items=0 ppid=3226 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.956000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:05.956000 audit[3416]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:05.956000 audit[3416]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd7c34ae80 a2=0 a3=7ffd7c34ae6c items=0 ppid=3226 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.956000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:05.969000 audit[3420]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3420 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:05.969000 audit[3420]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe95744b80 a2=0 a3=7ffe95744b6c items=0 ppid=3226 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:05.969000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:07.187815 env[1222]: time="2025-03-17T18:44:07.187762120Z" level=info msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.253 [INFO][3442] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.254 [INFO][3442] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" iface="eth0" netns="/var/run/netns/cni-5e372a53-9167-9fff-8e0e-cb17dd15e225" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.254 [INFO][3442] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" iface="eth0" netns="/var/run/netns/cni-5e372a53-9167-9fff-8e0e-cb17dd15e225" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.255 [INFO][3442] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" iface="eth0" netns="/var/run/netns/cni-5e372a53-9167-9fff-8e0e-cb17dd15e225" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.255 [INFO][3442] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.255 [INFO][3442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.289 [INFO][3448] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.289 [INFO][3448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.289 [INFO][3448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.298 [WARNING][3448] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.298 [INFO][3448] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.301 [INFO][3448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:07.305889 env[1222]: 2025-03-17 18:44:07.304 [INFO][3442] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:07.313520 env[1222]: time="2025-03-17T18:44:07.306078758Z" level=info msg="TearDown network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" successfully" Mar 17 18:44:07.313520 env[1222]: time="2025-03-17T18:44:07.306124669Z" level=info msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" returns successfully" Mar 17 18:44:07.313520 env[1222]: time="2025-03-17T18:44:07.307048568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-2qpnh,Uid:296922d6-2029-455a-8726-e8a75a73aaad,Namespace:calico-apiserver,Attempt:1,}" Mar 17 18:44:07.311247 systemd[1]: run-netns-cni\x2d5e372a53\x2d9167\x2d9fff\x2d8e0e\x2dcb17dd15e225.mount: Deactivated successfully. Mar 17 18:44:07.407643 systemd-networkd[1027]: vxlan.calico: Gained IPv6LL Mar 17 18:44:07.483123 systemd-networkd[1027]: caliee0fa3c51ab: Link UP Mar 17 18:44:07.497746 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:44:07.497953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliee0fa3c51ab: link becomes ready Mar 17 18:44:07.498575 systemd-networkd[1027]: caliee0fa3c51ab: Gained carrier Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.380 [INFO][3454] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0 calico-apiserver-77588b4d96- calico-apiserver 296922d6-2029-455a-8726-e8a75a73aaad 772 0 2025-03-17 18:43:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77588b4d96 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal calico-apiserver-77588b4d96-2qpnh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliee0fa3c51ab [] []}} ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.381 [INFO][3454] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.421 [INFO][3466] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" HandleID="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.435 [INFO][3466] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" HandleID="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003190c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"calico-apiserver-77588b4d96-2qpnh", "timestamp":"2025-03-17 18:44:07.421119627 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.435 [INFO][3466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.435 [INFO][3466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.435 [INFO][3466] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.439 [INFO][3466] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.444 [INFO][3466] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.449 [INFO][3466] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.453 [INFO][3466] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.457 [INFO][3466] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.457 [INFO][3466] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.459 [INFO][3466] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.465 [INFO][3466] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.473 [INFO][3466] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.1/26] block=192.168.48.0/26 handle="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.474 [INFO][3466] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.1/26] handle="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.474 [INFO][3466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:07.528539 env[1222]: 2025-03-17 18:44:07.474 [INFO][3466] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.1/26] IPv6=[] ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" HandleID="k8s-pod-network.974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.476 [INFO][3454] cni-plugin/k8s.go 386: Populated endpoint ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"296922d6-2029-455a-8726-e8a75a73aaad", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-77588b4d96-2qpnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliee0fa3c51ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.476 [INFO][3454] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.1/32] ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.476 [INFO][3454] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliee0fa3c51ab ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.499 [INFO][3454] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.500 [INFO][3454] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"296922d6-2029-455a-8726-e8a75a73aaad", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a", Pod:"calico-apiserver-77588b4d96-2qpnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliee0fa3c51ab", MAC:"e2:eb:0a:0c:b0:28", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:07.529827 env[1222]: 2025-03-17 18:44:07.518 [INFO][3454] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-2qpnh" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:07.548000 audit[3486]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:07.548000 audit[3486]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc33b02990 a2=0 a3=7ffc33b0297c items=0 ppid=3226 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.548000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:07.557090 env[1222]: time="2025-03-17T18:44:07.556974957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:07.557397 env[1222]: time="2025-03-17T18:44:07.557102105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:07.557397 env[1222]: time="2025-03-17T18:44:07.557146006Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:07.558568 env[1222]: time="2025-03-17T18:44:07.557659941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a pid=3494 runtime=io.containerd.runc.v2 Mar 17 18:44:07.600271 systemd[1]: run-containerd-runc-k8s.io-974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a-runc.rZ3XcE.mount: Deactivated successfully. Mar 17 18:44:07.606155 systemd[1]: Started cri-containerd-974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a.scope. Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.625000 audit: BPF prog-id=158 op=LOAD Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3494 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343831376434353431383439643163333734613638313066326232 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3494 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343831376434353431383439643163333734613638313066326232 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit: BPF prog-id=159 op=LOAD Mar 17 18:44:07.627000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f8d90 items=0 ppid=3494 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343831376434353431383439643163333734613638313066326232 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.627000 audit: BPF prog-id=160 op=LOAD Mar 17 18:44:07.627000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f8dd8 items=0 ppid=3494 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343831376434353431383439643163333734613638313066326232 Mar 17 18:44:07.628000 audit: BPF prog-id=160 op=UNLOAD Mar 17 18:44:07.628000 audit: BPF prog-id=159 op=UNLOAD Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:07.628000 audit: BPF prog-id=161 op=LOAD Mar 17 18:44:07.628000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f91e8 items=0 ppid=3494 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:07.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343831376434353431383439643163333734613638313066326232 Mar 17 18:44:07.668488 env[1222]: time="2025-03-17T18:44:07.668431126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-2qpnh,Uid:296922d6-2029-455a-8726-e8a75a73aaad,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a\"" Mar 17 18:44:07.672020 env[1222]: time="2025-03-17T18:44:07.671169510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 18:44:08.189459 env[1222]: time="2025-03-17T18:44:08.189099321Z" level=info msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" Mar 17 18:44:08.191277 env[1222]: time="2025-03-17T18:44:08.189646003Z" level=info msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.290 [INFO][3556] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.290 [INFO][3556] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" iface="eth0" netns="/var/run/netns/cni-2e6e2214-b917-1ccc-0b37-8c0e26d1027b" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.290 [INFO][3556] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" iface="eth0" netns="/var/run/netns/cni-2e6e2214-b917-1ccc-0b37-8c0e26d1027b" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.291 [INFO][3556] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" iface="eth0" netns="/var/run/netns/cni-2e6e2214-b917-1ccc-0b37-8c0e26d1027b" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.291 [INFO][3556] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.291 [INFO][3556] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.355 [INFO][3568] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.355 [INFO][3568] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.355 [INFO][3568] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.366 [WARNING][3568] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.366 [INFO][3568] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.369 [INFO][3568] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:08.372266 env[1222]: 2025-03-17 18:44:08.371 [INFO][3556] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:08.381175 systemd[1]: run-netns-cni\x2d2e6e2214\x2db917\x2d1ccc\x2d0b37\x2d8c0e26d1027b.mount: Deactivated successfully. Mar 17 18:44:08.383610 env[1222]: time="2025-03-17T18:44:08.383553057Z" level=info msg="TearDown network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" successfully" Mar 17 18:44:08.383818 env[1222]: time="2025-03-17T18:44:08.383787580Z" level=info msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" returns successfully" Mar 17 18:44:08.385193 env[1222]: time="2025-03-17T18:44:08.385146550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-djlk9,Uid:4b1d5a2a-cbd3-47f6-b41e-827638039dfd,Namespace:calico-apiserver,Attempt:1,}" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.318 [INFO][3557] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.318 [INFO][3557] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" iface="eth0" netns="/var/run/netns/cni-0213d5ef-79d1-99df-bb57-f70340c27a92" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.318 [INFO][3557] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" iface="eth0" netns="/var/run/netns/cni-0213d5ef-79d1-99df-bb57-f70340c27a92" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.319 [INFO][3557] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" iface="eth0" netns="/var/run/netns/cni-0213d5ef-79d1-99df-bb57-f70340c27a92" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.319 [INFO][3557] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.319 [INFO][3557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.394 [INFO][3572] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.395 [INFO][3572] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.395 [INFO][3572] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.414 [WARNING][3572] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.415 [INFO][3572] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.424 [INFO][3572] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:08.431136 env[1222]: 2025-03-17 18:44:08.426 [INFO][3557] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:08.436617 env[1222]: time="2025-03-17T18:44:08.436542593Z" level=info msg="TearDown network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" successfully" Mar 17 18:44:08.436818 env[1222]: time="2025-03-17T18:44:08.436786282Z" level=info msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" returns successfully" Mar 17 18:44:08.438038 env[1222]: time="2025-03-17T18:44:08.437996994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k4skw,Uid:a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd,Namespace:kube-system,Attempt:1,}" Mar 17 18:44:08.440622 systemd[1]: run-netns-cni\x2d0213d5ef\x2d79d1\x2d99df\x2dbb57\x2df70340c27a92.mount: Deactivated successfully. Mar 17 18:44:08.656316 systemd-networkd[1027]: calif2359b33e23: Link UP Mar 17 18:44:08.669245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:44:08.669547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif2359b33e23: link becomes ready Mar 17 18:44:08.669989 systemd-networkd[1027]: calif2359b33e23: Gained carrier Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.513 [INFO][3580] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0 calico-apiserver-77588b4d96- calico-apiserver 4b1d5a2a-cbd3-47f6-b41e-827638039dfd 783 0 2025-03-17 18:43:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77588b4d96 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal calico-apiserver-77588b4d96-djlk9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif2359b33e23 [] []}} ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.513 [INFO][3580] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.585 [INFO][3603] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" HandleID="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.602 [INFO][3603] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" HandleID="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050b50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"calico-apiserver-77588b4d96-djlk9", "timestamp":"2025-03-17 18:44:08.58587391 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.603 [INFO][3603] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.603 [INFO][3603] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.603 [INFO][3603] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.606 [INFO][3603] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.612 [INFO][3603] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.618 [INFO][3603] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.622 [INFO][3603] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.626 [INFO][3603] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.626 [INFO][3603] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.629 [INFO][3603] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194 Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.640 [INFO][3603] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.649 [INFO][3603] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.2/26] block=192.168.48.0/26 handle="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.649 [INFO][3603] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.2/26] handle="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.649 [INFO][3603] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:08.693782 env[1222]: 2025-03-17 18:44:08.649 [INFO][3603] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.2/26] IPv6=[] ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" HandleID="k8s-pod-network.5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.651 [INFO][3580] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b1d5a2a-cbd3-47f6-b41e-827638039dfd", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-77588b4d96-djlk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif2359b33e23", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.651 [INFO][3580] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.2/32] ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.651 [INFO][3580] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif2359b33e23 ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.672 [INFO][3580] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.672 [INFO][3580] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b1d5a2a-cbd3-47f6-b41e-827638039dfd", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194", Pod:"calico-apiserver-77588b4d96-djlk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif2359b33e23", MAC:"be:ea:e7:7d:d7:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:08.695330 env[1222]: 2025-03-17 18:44:08.686 [INFO][3580] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194" Namespace="calico-apiserver" Pod="calico-apiserver-77588b4d96-djlk9" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:08.768568 kernel: kauditd_printk_skb: 614 callbacks suppressed Mar 17 18:44:08.768748 kernel: audit: type=1325 audit(1742237048.744:1103): table=filter:102 family=2 entries=34 op=nft_register_chain pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:08.744000 audit[3636]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:08.744000 audit[3636]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffcd027bce0 a2=0 a3=7ffcd027bccc items=0 ppid=3226 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.803442 kernel: audit: type=1300 audit(1742237048.744:1103): arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffcd027bce0 a2=0 a3=7ffcd027bccc items=0 ppid=3226 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.807767 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32086d51898: link becomes ready Mar 17 18:44:08.803700 systemd-networkd[1027]: cali32086d51898: Link UP Mar 17 18:44:08.803963 systemd-networkd[1027]: cali32086d51898: Gained carrier Mar 17 18:44:08.744000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:08.818660 env[1222]: time="2025-03-17T18:44:08.793723283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:08.818660 env[1222]: time="2025-03-17T18:44:08.793806724Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:08.818660 env[1222]: time="2025-03-17T18:44:08.793846838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:08.818660 env[1222]: time="2025-03-17T18:44:08.794085773Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194 pid=3637 runtime=io.containerd.runc.v2 Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.568 [INFO][3592] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0 coredns-6f6b679f8f- kube-system a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd 784 0 2025-03-17 18:43:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal coredns-6f6b679f8f-k4skw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali32086d51898 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.573 [INFO][3592] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.633 [INFO][3610] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" HandleID="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.702 [INFO][3610] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" HandleID="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000421ca0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-k4skw", "timestamp":"2025-03-17 18:44:08.63314325 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.702 [INFO][3610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.702 [INFO][3610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.703 [INFO][3610] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.708 [INFO][3610] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.718 [INFO][3610] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.735 [INFO][3610] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.738 [INFO][3610] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.746 [INFO][3610] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.746 [INFO][3610] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.749 [INFO][3610] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.757 [INFO][3610] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.770 [INFO][3610] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.3/26] block=192.168.48.0/26 handle="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.770 [INFO][3610] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.3/26] handle="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.770 [INFO][3610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:08.834153 env[1222]: 2025-03-17 18:44:08.770 [INFO][3610] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.3/26] IPv6=[] ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" HandleID="k8s-pod-network.1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.837089 kernel: audit: type=1327 audit(1742237048.744:1103): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.772 [INFO][3592] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-k4skw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali32086d51898", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.773 [INFO][3592] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.3/32] ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.773 [INFO][3592] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32086d51898 ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.776 [INFO][3592] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.776 [INFO][3592] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb", Pod:"coredns-6f6b679f8f-k4skw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali32086d51898", MAC:"22:8d:af:ec:fc:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:08.837167 env[1222]: 2025-03-17 18:44:08.826 [INFO][3592] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb" Namespace="kube-system" Pod="coredns-6f6b679f8f-k4skw" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:08.859000 audit[3664]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3664 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:08.888459 kernel: audit: type=1325 audit(1742237048.859:1104): table=filter:103 family=2 entries=42 op=nft_register_chain pid=3664 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:08.888628 kernel: audit: type=1300 audit(1742237048.859:1104): arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffe3fe4c670 a2=0 a3=7ffe3fe4c65c items=0 ppid=3226 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.859000 audit[3664]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffe3fe4c670 a2=0 a3=7ffe3fe4c65c items=0 ppid=3226 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.882738 systemd[1]: Started cri-containerd-5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194.scope. Mar 17 18:44:08.859000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:08.942510 kernel: audit: type=1327 audit(1742237048.859:1104): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.967629 kernel: audit: type=1400 audit(1742237048.944:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.991695 kernel: audit: type=1400 audit(1742237048.944:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.034022 kernel: audit: type=1400 audit(1742237048.944:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.034205 kernel: audit: type=1400 audit(1742237048.944:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.945000 audit: BPF prog-id=162 op=LOAD Mar 17 18:44:08.968000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.968000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3637 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613332656535346261393061313531623063396637313065316338 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3637 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613332656535346261393061313531623063396637313065316338 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit: BPF prog-id=163 op=LOAD Mar 17 18:44:08.969000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002bd910 items=0 ppid=3637 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613332656535346261393061313531623063396637313065316338 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.969000 audit: BPF prog-id=164 op=LOAD Mar 17 18:44:08.969000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002bd958 items=0 ppid=3637 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613332656535346261393061313531623063396637313065316338 Mar 17 18:44:08.969000 audit: BPF prog-id=164 op=UNLOAD Mar 17 18:44:08.970000 audit: BPF prog-id=163 op=UNLOAD Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.048688 env[1222]: time="2025-03-17T18:44:09.048597061Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:09.048895 env[1222]: time="2025-03-17T18:44:09.048659799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:09.048895 env[1222]: time="2025-03-17T18:44:09.048678539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:09.049085 env[1222]: time="2025-03-17T18:44:09.048877709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb pid=3684 runtime=io.containerd.runc.v2 Mar 17 18:44:08.970000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:08.970000 audit: BPF prog-id=165 op=LOAD Mar 17 18:44:08.970000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002bdd68 items=0 ppid=3637 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:08.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613332656535346261393061313531623063396637313065316338 Mar 17 18:44:09.094978 systemd[1]: Started cri-containerd-1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb.scope. Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.142000 audit: BPF prog-id=166 op=LOAD Mar 17 18:44:09.144000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.144000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3684 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303039336433356664383138323061653738303031376335386436 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3684 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303039336433356664383138323061653738303031376335386436 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.145000 audit: BPF prog-id=167 op=LOAD Mar 17 18:44:09.145000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b180 items=0 ppid=3684 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303039336433356664383138323061653738303031376335386436 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.147000 audit: BPF prog-id=168 op=LOAD Mar 17 18:44:09.147000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b1c8 items=0 ppid=3684 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303039336433356664383138323061653738303031376335386436 Mar 17 18:44:09.148000 audit: BPF prog-id=168 op=UNLOAD Mar 17 18:44:09.148000 audit: BPF prog-id=167 op=UNLOAD Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.148000 audit: BPF prog-id=169 op=LOAD Mar 17 18:44:09.148000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b5d8 items=0 ppid=3684 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303039336433356664383138323061653738303031376335386436 Mar 17 18:44:09.157702 env[1222]: time="2025-03-17T18:44:09.157644740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77588b4d96-djlk9,Uid:4b1d5a2a-cbd3-47f6-b41e-827638039dfd,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194\"" Mar 17 18:44:09.195239 env[1222]: time="2025-03-17T18:44:09.195160636Z" level=info msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" Mar 17 18:44:09.208347 env[1222]: time="2025-03-17T18:44:09.208295654Z" level=info msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" Mar 17 18:44:09.226262 env[1222]: time="2025-03-17T18:44:09.226105834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k4skw,Uid:a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb\"" Mar 17 18:44:09.238056 env[1222]: time="2025-03-17T18:44:09.237997561Z" level=info msg="CreateContainer within sandbox \"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 18:44:09.268962 env[1222]: time="2025-03-17T18:44:09.268896807Z" level=info msg="CreateContainer within sandbox \"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bd48e3e173e60be3e8eca2a80de65cb852847ad12c8372a68cb80f459c1d7f89\"" Mar 17 18:44:09.271562 env[1222]: time="2025-03-17T18:44:09.270578576Z" level=info msg="StartContainer for \"bd48e3e173e60be3e8eca2a80de65cb852847ad12c8372a68cb80f459c1d7f89\"" Mar 17 18:44:09.396800 systemd-networkd[1027]: caliee0fa3c51ab: Gained IPv6LL Mar 17 18:44:09.407741 systemd[1]: run-containerd-runc-k8s.io-bd48e3e173e60be3e8eca2a80de65cb852847ad12c8372a68cb80f459c1d7f89-runc.Dw82kz.mount: Deactivated successfully. Mar 17 18:44:09.416669 systemd[1]: Started cri-containerd-bd48e3e173e60be3e8eca2a80de65cb852847ad12c8372a68cb80f459c1d7f89.scope. Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.440000 audit: BPF prog-id=170 op=LOAD Mar 17 18:44:09.442000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.442000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3684 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343865336531373365363062653365386563613261383064653635 Mar 17 18:44:09.442000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.442000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3684 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343865336531373365363062653365386563613261383064653635 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.443000 audit: BPF prog-id=171 op=LOAD Mar 17 18:44:09.443000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032d590 items=0 ppid=3684 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343865336531373365363062653365386563613261383064653635 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.444000 audit: BPF prog-id=172 op=LOAD Mar 17 18:44:09.444000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032d5d8 items=0 ppid=3684 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343865336531373365363062653365386563613261383064653635 Mar 17 18:44:09.445000 audit: BPF prog-id=172 op=UNLOAD Mar 17 18:44:09.446000 audit: BPF prog-id=171 op=UNLOAD Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:09.446000 audit: BPF prog-id=173 op=LOAD Mar 17 18:44:09.446000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032d9e8 items=0 ppid=3684 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:09.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343865336531373365363062653365386563613261383064653635 Mar 17 18:44:09.553468 env[1222]: time="2025-03-17T18:44:09.552157465Z" level=info msg="StartContainer for \"bd48e3e173e60be3e8eca2a80de65cb852847ad12c8372a68cb80f459c1d7f89\" returns successfully" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.361 [INFO][3752] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.362 [INFO][3752] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" iface="eth0" netns="/var/run/netns/cni-d67dc19c-2e45-afae-665e-3d8773c6ff4c" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.362 [INFO][3752] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" iface="eth0" netns="/var/run/netns/cni-d67dc19c-2e45-afae-665e-3d8773c6ff4c" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.362 [INFO][3752] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" iface="eth0" netns="/var/run/netns/cni-d67dc19c-2e45-afae-665e-3d8773c6ff4c" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.362 [INFO][3752] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.363 [INFO][3752] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.537 [INFO][3776] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.544 [INFO][3776] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.545 [INFO][3776] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.573 [WARNING][3776] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.573 [INFO][3776] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.575 [INFO][3776] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:09.588513 env[1222]: 2025-03-17 18:44:09.577 [INFO][3752] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:09.588513 env[1222]: time="2025-03-17T18:44:09.584479156Z" level=info msg="TearDown network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" successfully" Mar 17 18:44:09.588513 env[1222]: time="2025-03-17T18:44:09.584624130Z" level=info msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" returns successfully" Mar 17 18:44:09.588513 env[1222]: time="2025-03-17T18:44:09.585696092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59d85f849c-tbgkt,Uid:c4025da7-6b6d-4efc-b29e-75e68b9ec285,Namespace:calico-system,Attempt:1,}" Mar 17 18:44:09.585219 systemd[1]: run-netns-cni\x2dd67dc19c\x2d2e45\x2dafae\x2d665e\x2d3d8773c6ff4c.mount: Deactivated successfully. Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.516 [INFO][3768] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.516 [INFO][3768] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" iface="eth0" netns="/var/run/netns/cni-7a0038da-35f7-e1fb-fbe8-35e097e78dac" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.516 [INFO][3768] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" iface="eth0" netns="/var/run/netns/cni-7a0038da-35f7-e1fb-fbe8-35e097e78dac" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.517 [INFO][3768] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" iface="eth0" netns="/var/run/netns/cni-7a0038da-35f7-e1fb-fbe8-35e097e78dac" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.517 [INFO][3768] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.517 [INFO][3768] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.615 [INFO][3801] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.615 [INFO][3801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.615 [INFO][3801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.632 [WARNING][3801] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.632 [INFO][3801] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.637 [INFO][3801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:09.642029 env[1222]: 2025-03-17 18:44:09.639 [INFO][3768] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:09.647198 systemd[1]: run-netns-cni\x2d7a0038da\x2d35f7\x2de1fb\x2dfbe8\x2d35e097e78dac.mount: Deactivated successfully. Mar 17 18:44:09.647678 env[1222]: time="2025-03-17T18:44:09.647622721Z" level=info msg="TearDown network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" successfully" Mar 17 18:44:09.647853 env[1222]: time="2025-03-17T18:44:09.647826209Z" level=info msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" returns successfully" Mar 17 18:44:09.651045 env[1222]: time="2025-03-17T18:44:09.650990172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xnjrg,Uid:eda150f1-13fa-4568-9ac6-402de2737c31,Namespace:calico-system,Attempt:1,}" Mar 17 18:44:09.904726 systemd-networkd[1027]: cali32086d51898: Gained IPv6LL Mar 17 18:44:09.974033 systemd-networkd[1027]: cali32a466ce520: Link UP Mar 17 18:44:09.976487 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:44:09.976623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32a466ce520: link becomes ready Mar 17 18:44:09.988274 systemd-networkd[1027]: cali32a466ce520: Gained carrier Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.779 [INFO][3819] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0 csi-node-driver- calico-system eda150f1-13fa-4568-9ac6-402de2737c31 799 0 2025-03-17 18:43:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal csi-node-driver-xnjrg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali32a466ce520 [] []}} ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.780 [INFO][3819] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.895 [INFO][3844] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" HandleID="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.920 [INFO][3844] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" HandleID="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00026c600), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"csi-node-driver-xnjrg", "timestamp":"2025-03-17 18:44:09.891309478 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.920 [INFO][3844] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.920 [INFO][3844] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.920 [INFO][3844] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.923 [INFO][3844] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.928 [INFO][3844] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.934 [INFO][3844] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.937 [INFO][3844] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.941 [INFO][3844] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.941 [INFO][3844] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.943 [INFO][3844] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0 Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.952 [INFO][3844] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.963 [INFO][3844] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.4/26] block=192.168.48.0/26 handle="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.963 [INFO][3844] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.4/26] handle="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.963 [INFO][3844] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:10.016097 env[1222]: 2025-03-17 18:44:09.963 [INFO][3844] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.4/26] IPv6=[] ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" HandleID="k8s-pod-network.73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:09.965 [INFO][3819] cni-plugin/k8s.go 386: Populated endpoint ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eda150f1-13fa-4568-9ac6-402de2737c31", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-xnjrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali32a466ce520", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:09.966 [INFO][3819] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.4/32] ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:09.966 [INFO][3819] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32a466ce520 ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:09.990 [INFO][3819] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:09.994 [INFO][3819] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eda150f1-13fa-4568-9ac6-402de2737c31", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0", Pod:"csi-node-driver-xnjrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali32a466ce520", MAC:"46:f6:54:8e:30:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.017365 env[1222]: 2025-03-17 18:44:10.009 [INFO][3819] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0" Namespace="calico-system" Pod="csi-node-driver-xnjrg" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:10.081000 audit[3875]: NETFILTER_CFG table=filter:104 family=2 entries=52 op=nft_register_chain pid=3875 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:10.081000 audit[3875]: SYSCALL arch=c000003e syscall=46 success=yes exit=25564 a0=3 a1=7ffc5d74f920 a2=0 a3=7ffc5d74f90c items=0 ppid=3226 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.081000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:10.112566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1685889963b: link becomes ready Mar 17 18:44:10.113267 systemd-networkd[1027]: cali1685889963b: Link UP Mar 17 18:44:10.115752 systemd-networkd[1027]: cali1685889963b: Gained carrier Mar 17 18:44:10.125656 env[1222]: time="2025-03-17T18:44:10.125547025Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:10.125879 env[1222]: time="2025-03-17T18:44:10.125677303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:10.125879 env[1222]: time="2025-03-17T18:44:10.125719424Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:10.128190 env[1222]: time="2025-03-17T18:44:10.126776873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0 pid=3879 runtime=io.containerd.runc.v2 Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.836 [INFO][3823] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0 calico-kube-controllers-59d85f849c- calico-system c4025da7-6b6d-4efc-b29e-75e68b9ec285 797 0 2025-03-17 18:43:42 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:59d85f849c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal calico-kube-controllers-59d85f849c-tbgkt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1685889963b [] []}} ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.837 [INFO][3823] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.903 [INFO][3849] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" HandleID="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.934 [INFO][3849] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" HandleID="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003107f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"calico-kube-controllers-59d85f849c-tbgkt", "timestamp":"2025-03-17 18:44:09.90395066 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.934 [INFO][3849] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.963 [INFO][3849] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:09.964 [INFO][3849] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.026 [INFO][3849] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.036 [INFO][3849] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.051 [INFO][3849] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.054 [INFO][3849] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.059 [INFO][3849] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.059 [INFO][3849] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.069 [INFO][3849] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.080 [INFO][3849] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.096 [INFO][3849] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.5/26] block=192.168.48.0/26 handle="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.096 [INFO][3849] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.5/26] handle="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.096 [INFO][3849] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:10.150982 env[1222]: 2025-03-17 18:44:10.097 [INFO][3849] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.5/26] IPv6=[] ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" HandleID="k8s-pod-network.d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.099 [INFO][3823] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0", GenerateName:"calico-kube-controllers-59d85f849c-", Namespace:"calico-system", SelfLink:"", UID:"c4025da7-6b6d-4efc-b29e-75e68b9ec285", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59d85f849c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-59d85f849c-tbgkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1685889963b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.100 [INFO][3823] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.5/32] ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.100 [INFO][3823] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1685889963b ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.114 [INFO][3823] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.115 [INFO][3823] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0", GenerateName:"calico-kube-controllers-59d85f849c-", Namespace:"calico-system", SelfLink:"", UID:"c4025da7-6b6d-4efc-b29e-75e68b9ec285", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59d85f849c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc", Pod:"calico-kube-controllers-59d85f849c-tbgkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1685889963b", MAC:"b2:7b:36:ce:6d:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.152319 env[1222]: 2025-03-17 18:44:10.134 [INFO][3823] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc" Namespace="calico-system" Pod="calico-kube-controllers-59d85f849c-tbgkt" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:10.179846 systemd[1]: Started cri-containerd-73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0.scope. Mar 17 18:44:10.190000 audit[3907]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3907 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:10.190000 audit[3907]: SYSCALL arch=c000003e syscall=46 success=yes exit=21000 a0=3 a1=7fff39f7df60 a2=0 a3=7fff39f7df4c items=0 ppid=3226 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.190000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:10.195759 env[1222]: time="2025-03-17T18:44:10.194243044Z" level=info msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.234000 audit: BPF prog-id=174 op=LOAD Mar 17 18:44:10.236000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.236000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3879 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613537303737303530623437343364666238623238636365336231 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3879 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613537303737303530623437343364666238623238636365336231 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.237000 audit: BPF prog-id=175 op=LOAD Mar 17 18:44:10.237000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a0d30 items=0 ppid=3879 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613537303737303530623437343364666238623238636365336231 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.238000 audit: BPF prog-id=176 op=LOAD Mar 17 18:44:10.238000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a0d78 items=0 ppid=3879 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613537303737303530623437343364666238623238636365336231 Mar 17 18:44:10.240000 audit: BPF prog-id=176 op=UNLOAD Mar 17 18:44:10.240000 audit: BPF prog-id=175 op=UNLOAD Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.240000 audit: BPF prog-id=177 op=LOAD Mar 17 18:44:10.240000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a1188 items=0 ppid=3879 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613537303737303530623437343364666238623238636365336231 Mar 17 18:44:10.279315 env[1222]: time="2025-03-17T18:44:10.270715991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:10.279315 env[1222]: time="2025-03-17T18:44:10.270806290Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:10.279315 env[1222]: time="2025-03-17T18:44:10.270844205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:10.279315 env[1222]: time="2025-03-17T18:44:10.271116290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc pid=3937 runtime=io.containerd.runc.v2 Mar 17 18:44:10.284074 env[1222]: time="2025-03-17T18:44:10.283997951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xnjrg,Uid:eda150f1-13fa-4568-9ac6-402de2737c31,Namespace:calico-system,Attempt:1,} returns sandbox id \"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0\"" Mar 17 18:44:10.340044 systemd[1]: Started cri-containerd-d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc.scope. Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.367000 audit: BPF prog-id=178 op=LOAD Mar 17 18:44:10.369000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.369000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3937 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431633534326539353336626465393734326634393461373164343161 Mar 17 18:44:10.369000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.369000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3937 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431633534326539353336626465393734326634393461373164343161 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.370000 audit: BPF prog-id=179 op=LOAD Mar 17 18:44:10.370000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e8010 items=0 ppid=3937 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431633534326539353336626465393734326634393461373164343161 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.371000 audit: BPF prog-id=180 op=LOAD Mar 17 18:44:10.371000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e8058 items=0 ppid=3937 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431633534326539353336626465393734326634393461373164343161 Mar 17 18:44:10.372000 audit: BPF prog-id=180 op=UNLOAD Mar 17 18:44:10.372000 audit: BPF prog-id=179 op=UNLOAD Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:10.372000 audit: BPF prog-id=181 op=LOAD Mar 17 18:44:10.372000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e8468 items=0 ppid=3937 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431633534326539353336626465393734326634393461373164343161 Mar 17 18:44:10.416550 systemd-networkd[1027]: calif2359b33e23: Gained IPv6LL Mar 17 18:44:10.515826 env[1222]: time="2025-03-17T18:44:10.515762511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59d85f849c-tbgkt,Uid:c4025da7-6b6d-4efc-b29e-75e68b9ec285,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc\"" Mar 17 18:44:10.563672 kubelet[2083]: I0317 18:44:10.563377 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-k4skw" podStartSLOduration=35.563347091 podStartE2EDuration="35.563347091s" podCreationTimestamp="2025-03-17 18:43:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:44:10.532488316 +0000 UTC m=+40.585445651" watchObservedRunningTime="2025-03-17 18:44:10.563347091 +0000 UTC m=+40.616304423" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.438 [INFO][3955] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.439 [INFO][3955] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" iface="eth0" netns="/var/run/netns/cni-6bddbe3d-bf4a-7cf7-4829-6ff0209333f1" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.439 [INFO][3955] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" iface="eth0" netns="/var/run/netns/cni-6bddbe3d-bf4a-7cf7-4829-6ff0209333f1" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.440 [INFO][3955] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" iface="eth0" netns="/var/run/netns/cni-6bddbe3d-bf4a-7cf7-4829-6ff0209333f1" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.440 [INFO][3955] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.440 [INFO][3955] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.560 [INFO][3983] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.561 [INFO][3983] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.561 [INFO][3983] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.582 [WARNING][3983] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.585 [INFO][3983] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.591 [INFO][3983] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:10.595589 env[1222]: 2025-03-17 18:44:10.593 [INFO][3955] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:10.604929 systemd[1]: run-netns-cni\x2d6bddbe3d\x2dbf4a\x2d7cf7\x2d4829\x2d6ff0209333f1.mount: Deactivated successfully. Mar 17 18:44:10.608981 env[1222]: time="2025-03-17T18:44:10.608919592Z" level=info msg="TearDown network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" successfully" Mar 17 18:44:10.609228 env[1222]: time="2025-03-17T18:44:10.609179401Z" level=info msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" returns successfully" Mar 17 18:44:10.610268 env[1222]: time="2025-03-17T18:44:10.610226454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-58v75,Uid:9288f0af-cbe0-428a-9ea2-660d440794e8,Namespace:kube-system,Attempt:1,}" Mar 17 18:44:10.618000 audit[3996]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=3996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:10.618000 audit[3996]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdc2899780 a2=0 a3=7ffdc289976c items=0 ppid=2216 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:10.625000 audit[3996]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:10.625000 audit[3996]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdc2899780 a2=0 a3=0 items=0 ppid=2216 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:10.674000 audit[4000]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:10.674000 audit[4000]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc1f417ed0 a2=0 a3=7ffc1f417ebc items=0 ppid=2216 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:10.679000 audit[4000]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:10.679000 audit[4000]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc1f417ed0 a2=0 a3=7ffc1f417ebc items=0 ppid=2216 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:10.881260 systemd-networkd[1027]: cali059fded77ad: Link UP Mar 17 18:44:10.891553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali059fded77ad: link becomes ready Mar 17 18:44:10.893001 systemd-networkd[1027]: cali059fded77ad: Gained carrier Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.742 [INFO][3998] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0 coredns-6f6b679f8f- kube-system 9288f0af-cbe0-428a-9ea2-660d440794e8 810 0 2025-03-17 18:43:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal coredns-6f6b679f8f-58v75 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali059fded77ad [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.742 [INFO][3998] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.813 [INFO][4013] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" HandleID="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.830 [INFO][4013] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" HandleID="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000284620), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-58v75", "timestamp":"2025-03-17 18:44:10.813271928 +0000 UTC"}, Hostname:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.830 [INFO][4013] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.831 [INFO][4013] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.831 [INFO][4013] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal' Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.834 [INFO][4013] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.839 [INFO][4013] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.846 [INFO][4013] ipam/ipam.go 489: Trying affinity for 192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.849 [INFO][4013] ipam/ipam.go 155: Attempting to load block cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.853 [INFO][4013] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.48.0/26 host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.853 [INFO][4013] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.48.0/26 handle="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.856 [INFO][4013] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.864 [INFO][4013] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.48.0/26 handle="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.875 [INFO][4013] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.48.6/26] block=192.168.48.0/26 handle="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.875 [INFO][4013] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.48.6/26] handle="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" host="ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal" Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.875 [INFO][4013] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:10.925170 env[1222]: 2025-03-17 18:44:10.875 [INFO][4013] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.48.6/26] IPv6=[] ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" HandleID="k8s-pod-network.4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.878 [INFO][3998] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9288f0af-cbe0-428a-9ea2-660d440794e8", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-58v75", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali059fded77ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.878 [INFO][3998] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.48.6/32] ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.878 [INFO][3998] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali059fded77ad ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.894 [INFO][3998] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.894 [INFO][3998] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9288f0af-cbe0-428a-9ea2-660d440794e8", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d", Pod:"coredns-6f6b679f8f-58v75", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali059fded77ad", MAC:"72:b6:de:44:98:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:10.926752 env[1222]: 2025-03-17 18:44:10.919 [INFO][3998] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d" Namespace="kube-system" Pod="coredns-6f6b679f8f-58v75" WorkloadEndpoint="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:10.973000 audit[4038]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:44:10.973000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7ffef2b61620 a2=0 a3=7ffef2b6160c items=0 ppid=3226 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:10.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:44:10.976763 env[1222]: time="2025-03-17T18:44:10.976661253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:44:10.976763 env[1222]: time="2025-03-17T18:44:10.976731703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:44:10.977049 env[1222]: time="2025-03-17T18:44:10.976749532Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:44:10.977843 env[1222]: time="2025-03-17T18:44:10.977774311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d pid=4039 runtime=io.containerd.runc.v2 Mar 17 18:44:11.049004 systemd[1]: Started cri-containerd-4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d.scope. Mar 17 18:44:11.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.080000 audit: BPF prog-id=182 op=LOAD Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4039 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343531336264326664313965323136303135306162646463353737 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4039 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343531336264326664313965323136303135306162646463353737 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit: BPF prog-id=183 op=LOAD Mar 17 18:44:11.081000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002cbce0 items=0 ppid=4039 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343531336264326664313965323136303135306162646463353737 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit: BPF prog-id=184 op=LOAD Mar 17 18:44:11.081000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002cbd28 items=0 ppid=4039 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343531336264326664313965323136303135306162646463353737 Mar 17 18:44:11.081000 audit: BPF prog-id=184 op=UNLOAD Mar 17 18:44:11.081000 audit: BPF prog-id=183 op=UNLOAD Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.081000 audit: BPF prog-id=185 op=LOAD Mar 17 18:44:11.081000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00034e138 items=0 ppid=4039 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343531336264326664313965323136303135306162646463353737 Mar 17 18:44:11.157899 env[1222]: time="2025-03-17T18:44:11.151880662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-58v75,Uid:9288f0af-cbe0-428a-9ea2-660d440794e8,Namespace:kube-system,Attempt:1,} returns sandbox id \"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d\"" Mar 17 18:44:11.163785 env[1222]: time="2025-03-17T18:44:11.163706214Z" level=info msg="CreateContainer within sandbox \"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 18:44:11.183601 systemd-networkd[1027]: cali32a466ce520: Gained IPv6LL Mar 17 18:44:11.196627 env[1222]: time="2025-03-17T18:44:11.196556856Z" level=info msg="CreateContainer within sandbox \"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c09797c7dba0b290bd9b43d7d16e7a7324200f3e770ef6183be70bc462a34709\"" Mar 17 18:44:11.199511 env[1222]: time="2025-03-17T18:44:11.199455776Z" level=info msg="StartContainer for \"c09797c7dba0b290bd9b43d7d16e7a7324200f3e770ef6183be70bc462a34709\"" Mar 17 18:44:11.250994 systemd[1]: Started cri-containerd-c09797c7dba0b290bd9b43d7d16e7a7324200f3e770ef6183be70bc462a34709.scope. Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.286000 audit: BPF prog-id=186 op=LOAD Mar 17 18:44:11.288000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.288000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4039 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393739376337646261306232393062643962343364376431366537 Mar 17 18:44:11.288000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.288000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4039 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393739376337646261306232393062643962343364376431366537 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.289000 audit: BPF prog-id=187 op=LOAD Mar 17 18:44:11.289000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000255e0 items=0 ppid=4039 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393739376337646261306232393062643962343364376431366537 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.290000 audit: BPF prog-id=188 op=LOAD Mar 17 18:44:11.290000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025628 items=0 ppid=4039 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393739376337646261306232393062643962343364376431366537 Mar 17 18:44:11.291000 audit: BPF prog-id=188 op=UNLOAD Mar 17 18:44:11.291000 audit: BPF prog-id=187 op=UNLOAD Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:11.291000 audit: BPF prog-id=189 op=LOAD Mar 17 18:44:11.291000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025a38 items=0 ppid=4039 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393739376337646261306232393062643962343364376431366537 Mar 17 18:44:11.319526 systemd-networkd[1027]: cali1685889963b: Gained IPv6LL Mar 17 18:44:11.330084 env[1222]: time="2025-03-17T18:44:11.330020459Z" level=info msg="StartContainer for \"c09797c7dba0b290bd9b43d7d16e7a7324200f3e770ef6183be70bc462a34709\" returns successfully" Mar 17 18:44:11.529606 kubelet[2083]: I0317 18:44:11.529534 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-58v75" podStartSLOduration=36.529507451 podStartE2EDuration="36.529507451s" podCreationTimestamp="2025-03-17 18:43:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:44:11.527829607 +0000 UTC m=+41.580786938" watchObservedRunningTime="2025-03-17 18:44:11.529507451 +0000 UTC m=+41.582464775" Mar 17 18:44:11.829000 audit[4114]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:11.829000 audit[4114]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffccf3dcfc0 a2=0 a3=7ffccf3dcfac items=0 ppid=2216 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:11.834000 audit[4114]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:11.834000 audit[4114]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffccf3dcfc0 a2=0 a3=7ffccf3dcfac items=0 ppid=2216 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:11.834000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:12.050561 env[1222]: time="2025-03-17T18:44:12.050490788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.054662 env[1222]: time="2025-03-17T18:44:12.053578428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.056741 env[1222]: time="2025-03-17T18:44:12.056679599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.059359 env[1222]: time="2025-03-17T18:44:12.059298112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.060446 env[1222]: time="2025-03-17T18:44:12.060335013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 18:44:12.062811 env[1222]: time="2025-03-17T18:44:12.062770704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 18:44:12.064605 env[1222]: time="2025-03-17T18:44:12.064523509Z" level=info msg="CreateContainer within sandbox \"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 18:44:12.090378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3321564338.mount: Deactivated successfully. Mar 17 18:44:12.097995 env[1222]: time="2025-03-17T18:44:12.097913255Z" level=info msg="CreateContainer within sandbox \"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5fa17db3c74133ec6b6206aeb66961ce94b57fa01ddd719a363decba2b784800\"" Mar 17 18:44:12.101504 env[1222]: time="2025-03-17T18:44:12.101446982Z" level=info msg="StartContainer for \"5fa17db3c74133ec6b6206aeb66961ce94b57fa01ddd719a363decba2b784800\"" Mar 17 18:44:12.148280 systemd[1]: Started cri-containerd-5fa17db3c74133ec6b6206aeb66961ce94b57fa01ddd719a363decba2b784800.scope. Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.168000 audit: BPF prog-id=190 op=LOAD Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3494 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613137646233633734313333656336623632303661656236363936 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3494 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613137646233633734313333656336623632303661656236363936 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit: BPF prog-id=191 op=LOAD Mar 17 18:44:12.169000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000229e00 items=0 ppid=3494 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613137646233633734313333656336623632303661656236363936 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.169000 audit: BPF prog-id=192 op=LOAD Mar 17 18:44:12.169000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229e48 items=0 ppid=3494 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613137646233633734313333656336623632303661656236363936 Mar 17 18:44:12.169000 audit: BPF prog-id=192 op=UNLOAD Mar 17 18:44:12.169000 audit: BPF prog-id=191 op=UNLOAD Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.170000 audit: BPF prog-id=193 op=LOAD Mar 17 18:44:12.170000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000418258 items=0 ppid=3494 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613137646233633734313333656336623632303661656236363936 Mar 17 18:44:12.217083 env[1222]: time="2025-03-17T18:44:12.217022488Z" level=info msg="StartContainer for \"5fa17db3c74133ec6b6206aeb66961ce94b57fa01ddd719a363decba2b784800\" returns successfully" Mar 17 18:44:12.337938 env[1222]: time="2025-03-17T18:44:12.337880711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.355089 env[1222]: time="2025-03-17T18:44:12.351733779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.372196 env[1222]: time="2025-03-17T18:44:12.372138677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.376535 env[1222]: time="2025-03-17T18:44:12.376481223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:12.377791 env[1222]: time="2025-03-17T18:44:12.377737289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 18:44:12.381512 env[1222]: time="2025-03-17T18:44:12.381471931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:44:12.383015 env[1222]: time="2025-03-17T18:44:12.382970219Z" level=info msg="CreateContainer within sandbox \"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 18:44:12.412080 env[1222]: time="2025-03-17T18:44:12.412006430Z" level=info msg="CreateContainer within sandbox \"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2010fa4c3a2ca116fd1a9c1e8d13608ec8ed960398feaf88c106cb38f769895\"" Mar 17 18:44:12.412787 env[1222]: time="2025-03-17T18:44:12.412675874Z" level=info msg="StartContainer for \"c2010fa4c3a2ca116fd1a9c1e8d13608ec8ed960398feaf88c106cb38f769895\"" Mar 17 18:44:12.477511 systemd[1]: Started cri-containerd-c2010fa4c3a2ca116fd1a9c1e8d13608ec8ed960398feaf88c106cb38f769895.scope. Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.514000 audit: BPF prog-id=194 op=LOAD Mar 17 18:44:12.516000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.516000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3637 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303130666134633361326361313136666431613963316538643133 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3637 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303130666134633361326361313136666431613963316538643133 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.517000 audit: BPF prog-id=195 op=LOAD Mar 17 18:44:12.517000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028b1e0 items=0 ppid=3637 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303130666134633361326361313136666431613963316538643133 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.519000 audit: BPF prog-id=196 op=LOAD Mar 17 18:44:12.519000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028b228 items=0 ppid=3637 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303130666134633361326361313136666431613963316538643133 Mar 17 18:44:12.520000 audit: BPF prog-id=196 op=UNLOAD Mar 17 18:44:12.520000 audit: BPF prog-id=195 op=UNLOAD Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:12.520000 audit: BPF prog-id=197 op=LOAD Mar 17 18:44:12.520000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b638 items=0 ppid=3637 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303130666134633361326361313136666431613963316538643133 Mar 17 18:44:12.591804 systemd-networkd[1027]: cali059fded77ad: Gained IPv6LL Mar 17 18:44:12.599000 audit[4188]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:12.599000 audit[4188]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc074b5a60 a2=0 a3=7ffc074b5a4c items=0 ppid=2216 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:12.602267 env[1222]: time="2025-03-17T18:44:12.602212919Z" level=info msg="StartContainer for \"c2010fa4c3a2ca116fd1a9c1e8d13608ec8ed960398feaf88c106cb38f769895\" returns successfully" Mar 17 18:44:12.622000 audit[4188]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:12.622000 audit[4188]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc074b5a60 a2=0 a3=7ffc074b5a4c items=0 ppid=2216 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:12.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:13.538097 kubelet[2083]: I0317 18:44:13.537999 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:44:13.562450 kubelet[2083]: I0317 18:44:13.562311 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77588b4d96-2qpnh" podStartSLOduration=27.171262976 podStartE2EDuration="31.562282648s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:44:07.670686523 +0000 UTC m=+37.723643848" lastFinishedPulling="2025-03-17 18:44:12.061706199 +0000 UTC m=+42.114663520" observedRunningTime="2025-03-17 18:44:12.55381155 +0000 UTC m=+42.606768879" watchObservedRunningTime="2025-03-17 18:44:13.562282648 +0000 UTC m=+43.615239972" Mar 17 18:44:13.731000 audit[4200]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:13.731000 audit[4200]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffed1409ca0 a2=0 a3=7ffed1409c8c items=0 ppid=2216 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:13.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:13.770434 kernel: kauditd_printk_skb: 545 callbacks suppressed Mar 17 18:44:13.770592 kernel: audit: type=1325 audit(1742237053.745:1279): table=nat:116 family=2 entries=20 op=nft_register_rule pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:13.745000 audit[4200]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:13.770763 env[1222]: time="2025-03-17T18:44:13.754618841Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:13.770763 env[1222]: time="2025-03-17T18:44:13.758995198Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:13.776935 env[1222]: time="2025-03-17T18:44:13.776879127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:13.783512 env[1222]: time="2025-03-17T18:44:13.783445473Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 18:44:13.784096 env[1222]: time="2025-03-17T18:44:13.784034287Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:13.745000 audit[4200]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffed1409ca0 a2=0 a3=7ffed1409c8c items=0 ppid=2216 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:13.818462 kernel: audit: type=1300 audit(1742237053.745:1279): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffed1409ca0 a2=0 a3=7ffed1409c8c items=0 ppid=2216 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:13.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:13.841457 kernel: audit: type=1327 audit(1742237053.745:1279): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:13.841623 env[1222]: time="2025-03-17T18:44:13.836842336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Mar 17 18:44:13.841623 env[1222]: time="2025-03-17T18:44:13.838920409Z" level=info msg="CreateContainer within sandbox \"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:44:13.871276 env[1222]: time="2025-03-17T18:44:13.871214875Z" level=info msg="CreateContainer within sandbox \"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ccc3a4dcea947ec16483f7e503ab5d2103209aee34bed785fb580d7850cb33ec\"" Mar 17 18:44:13.873182 env[1222]: time="2025-03-17T18:44:13.873119390Z" level=info msg="StartContainer for \"ccc3a4dcea947ec16483f7e503ab5d2103209aee34bed785fb580d7850cb33ec\"" Mar 17 18:44:13.932806 systemd[1]: Started cri-containerd-ccc3a4dcea947ec16483f7e503ab5d2103209aee34bed785fb580d7850cb33ec.scope. Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.097871 kernel: audit: type=1400 audit(1742237054.073:1280): avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7ac15db138 items=0 ppid=3879 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:14.131617 kernel: audit: type=1300 audit(1742237054.073:1280): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7ac15db138 items=0 ppid=3879 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:14.166443 kernel: audit: type=1327 audit(1742237054.073:1280): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633361346463656139343765633136343833663765353033616235 Mar 17 18:44:14.166604 kernel: audit: type=1400 audit(1742237054.073:1281): avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633361346463656139343765633136343833663765353033616235 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.189679 kernel: audit: type=1400 audit(1742237054.073:1281): avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.208520 kernel: audit: type=1400 audit(1742237054.073:1281): avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.251485 kernel: audit: type=1400 audit(1742237054.073:1281): avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.073000 audit: BPF prog-id=198 op=LOAD Mar 17 18:44:14.073000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182688 items=0 ppid=3879 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:14.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633361346463656139343765633136343833663765353033616235 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.166000 audit: BPF prog-id=199 op=LOAD Mar 17 18:44:14.166000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001826d8 items=0 ppid=3879 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:14.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633361346463656139343765633136343833663765353033616235 Mar 17 18:44:14.231000 audit: BPF prog-id=199 op=UNLOAD Mar 17 18:44:14.231000 audit: BPF prog-id=198 op=UNLOAD Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:14.231000 audit: BPF prog-id=200 op=LOAD Mar 17 18:44:14.231000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000182768 items=0 ppid=3879 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:14.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633361346463656139343765633136343833663765353033616235 Mar 17 18:44:14.307684 env[1222]: time="2025-03-17T18:44:14.307616313Z" level=info msg="StartContainer for \"ccc3a4dcea947ec16483f7e503ab5d2103209aee34bed785fb580d7850cb33ec\" returns successfully" Mar 17 18:44:14.462000 audit[4135]: AVC avc: denied { watch } for pid=4135 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_43_54.557245212/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c226,c460 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c226,c460 tclass=file permissive=0 Mar 17 18:44:14.462000 audit[4135]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a84c20 a2=fc6 a3=0 items=0 ppid=3494 pid=4135 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c226,c460 key=(null) Mar 17 18:44:14.462000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:44:14.544898 kubelet[2083]: I0317 18:44:14.544147 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:44:14.860141 systemd[1]: run-containerd-runc-k8s.io-ccc3a4dcea947ec16483f7e503ab5d2103209aee34bed785fb580d7850cb33ec-runc.1ZJ5Xp.mount: Deactivated successfully. Mar 17 18:44:15.570000 audit[4174]: AVC avc: denied { watch } for pid=4174 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_43_54.3965524426/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c978 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c604,c978 tclass=file permissive=0 Mar 17 18:44:15.570000 audit[4174]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a80600 a2=fc6 a3=0 items=0 ppid=3637 pid=4174 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c978 key=(null) Mar 17 18:44:15.570000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:44:16.476284 env[1222]: time="2025-03-17T18:44:16.476221775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:16.479514 env[1222]: time="2025-03-17T18:44:16.479453780Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:16.483267 env[1222]: time="2025-03-17T18:44:16.483168301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:16.487320 env[1222]: time="2025-03-17T18:44:16.487263905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:16.488360 env[1222]: time="2025-03-17T18:44:16.488297539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Mar 17 18:44:16.492199 env[1222]: time="2025-03-17T18:44:16.492136122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:44:16.525908 env[1222]: time="2025-03-17T18:44:16.525835103Z" level=info msg="CreateContainer within sandbox \"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Mar 17 18:44:16.555649 env[1222]: time="2025-03-17T18:44:16.555569550Z" level=info msg="CreateContainer within sandbox \"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5\"" Mar 17 18:44:16.556882 env[1222]: time="2025-03-17T18:44:16.556832012Z" level=info msg="StartContainer for \"c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5\"" Mar 17 18:44:16.619533 systemd[1]: Started cri-containerd-c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5.scope. Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.655000 audit: BPF prog-id=201 op=LOAD Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3937 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:16.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332346237343737613732636632353263386139373739336666366239 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3937 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:16.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332346237343737613732636632353263386139373739336666366239 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit: BPF prog-id=202 op=LOAD Mar 17 18:44:16.656000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a35c0 items=0 ppid=3937 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:16.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332346237343737613732636632353263386139373739336666366239 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit: BPF prog-id=203 op=LOAD Mar 17 18:44:16.656000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a3608 items=0 ppid=3937 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:16.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332346237343737613732636632353263386139373739336666366239 Mar 17 18:44:16.656000 audit: BPF prog-id=203 op=UNLOAD Mar 17 18:44:16.656000 audit: BPF prog-id=202 op=UNLOAD Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:16.656000 audit: BPF prog-id=204 op=LOAD Mar 17 18:44:16.656000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a3a18 items=0 ppid=3937 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:16.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332346237343737613732636632353263386139373739336666366239 Mar 17 18:44:16.718496 env[1222]: time="2025-03-17T18:44:16.718362003Z" level=info msg="StartContainer for \"c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5\" returns successfully" Mar 17 18:44:17.577111 kubelet[2083]: I0317 18:44:17.577015 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77588b4d96-djlk9" podStartSLOduration=32.356971636 podStartE2EDuration="35.57698314s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:44:09.160011402 +0000 UTC m=+39.212968720" lastFinishedPulling="2025-03-17 18:44:12.380022915 +0000 UTC m=+42.432980224" observedRunningTime="2025-03-17 18:44:13.563287539 +0000 UTC m=+43.616244866" watchObservedRunningTime="2025-03-17 18:44:17.57698314 +0000 UTC m=+47.629940475" Mar 17 18:44:17.592960 systemd[1]: run-containerd-runc-k8s.io-c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5-runc.1sKaV5.mount: Deactivated successfully. Mar 17 18:44:17.678155 kubelet[2083]: I0317 18:44:17.677901 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-59d85f849c-tbgkt" podStartSLOduration=29.705692002 podStartE2EDuration="35.677843019s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:44:10.518596595 +0000 UTC m=+40.571553905" lastFinishedPulling="2025-03-17 18:44:16.490747618 +0000 UTC m=+46.543704922" observedRunningTime="2025-03-17 18:44:17.577656009 +0000 UTC m=+47.630613340" watchObservedRunningTime="2025-03-17 18:44:17.677843019 +0000 UTC m=+47.730800352" Mar 17 18:44:18.103447 env[1222]: time="2025-03-17T18:44:18.103376539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:18.106784 env[1222]: time="2025-03-17T18:44:18.106723938Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:18.109462 env[1222]: time="2025-03-17T18:44:18.109389901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:18.111977 env[1222]: time="2025-03-17T18:44:18.111925255Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:44:18.112722 env[1222]: time="2025-03-17T18:44:18.112664055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 18:44:18.117620 env[1222]: time="2025-03-17T18:44:18.117555769Z" level=info msg="CreateContainer within sandbox \"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:44:18.143792 env[1222]: time="2025-03-17T18:44:18.143722501Z" level=info msg="CreateContainer within sandbox \"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ad2e95f3efeb8297aa54daafecf124bdb9a622349b2e8f1e38c8c454a3297e5c\"" Mar 17 18:44:18.148883 env[1222]: time="2025-03-17T18:44:18.148826863Z" level=info msg="StartContainer for \"ad2e95f3efeb8297aa54daafecf124bdb9a622349b2e8f1e38c8c454a3297e5c\"" Mar 17 18:44:18.189696 systemd[1]: Started cri-containerd-ad2e95f3efeb8297aa54daafecf124bdb9a622349b2e8f1e38c8c454a3297e5c.scope. Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6f1135c2e8 items=0 ppid=3879 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:18.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326539356633656665623832393761613534646161666563663132 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.218000 audit: BPF prog-id=205 op=LOAD Mar 17 18:44:18.218000 audit[4303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002f7c58 items=0 ppid=3879 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:18.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326539356633656665623832393761613534646161666563663132 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit: BPF prog-id=206 op=LOAD Mar 17 18:44:18.219000 audit[4303]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002f7ca8 items=0 ppid=3879 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:18.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326539356633656665623832393761613534646161666563663132 Mar 17 18:44:18.219000 audit: BPF prog-id=206 op=UNLOAD Mar 17 18:44:18.219000 audit: BPF prog-id=205 op=UNLOAD Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:44:18.219000 audit: BPF prog-id=207 op=LOAD Mar 17 18:44:18.219000 audit[4303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002f7d38 items=0 ppid=3879 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:18.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326539356633656665623832393761613534646161666563663132 Mar 17 18:44:18.246528 env[1222]: time="2025-03-17T18:44:18.246444289Z" level=info msg="StartContainer for \"ad2e95f3efeb8297aa54daafecf124bdb9a622349b2e8f1e38c8c454a3297e5c\" returns successfully" Mar 17 18:44:18.352239 kubelet[2083]: I0317 18:44:18.352152 2083 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:44:18.352239 kubelet[2083]: I0317 18:44:18.352197 2083 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:44:21.257662 systemd[1]: run-containerd-runc-k8s.io-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135-runc.57h0xe.mount: Deactivated successfully. Mar 17 18:44:21.342392 kubelet[2083]: I0317 18:44:21.342288 2083 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xnjrg" podStartSLOduration=31.513824066 podStartE2EDuration="39.34226331s" podCreationTimestamp="2025-03-17 18:43:42 +0000 UTC" firstStartedPulling="2025-03-17 18:44:10.286050707 +0000 UTC m=+40.339008020" lastFinishedPulling="2025-03-17 18:44:18.11448994 +0000 UTC m=+48.167447264" observedRunningTime="2025-03-17 18:44:18.578173358 +0000 UTC m=+48.631130757" watchObservedRunningTime="2025-03-17 18:44:21.34226331 +0000 UTC m=+51.395220641" Mar 17 18:44:25.880000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:25.887885 kernel: kauditd_printk_skb: 142 callbacks suppressed Mar 17 18:44:25.888059 kernel: audit: type=1400 audit(1742237065.880:1312): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:25.880000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e53e90 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:25.949437 kernel: audit: type=1300 audit(1742237065.880:1312): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e53e90 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:25.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:25.886000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.004628 kernel: audit: type=1327 audit(1742237065.880:1312): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:26.004819 kernel: audit: type=1400 audit(1742237065.886:1313): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:25.886000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014db440 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:26.040163 kernel: audit: type=1300 audit(1742237065.886:1313): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014db440 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:25.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:26.070543 kernel: audit: type=1327 audit(1742237065.886:1313): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:26.389000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.416504 kernel: audit: type=1400 audit(1742237066.389:1314): avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.389000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004856280 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.451470 kernel: audit: type=1300 audit(1742237066.389:1314): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004856280 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.389000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.486434 kernel: audit: type=1327 audit(1742237066.389:1314): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.389000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.389000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0052ef2c0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.389000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.389000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.514470 kernel: audit: type=1400 audit(1742237066.389:1315): avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.389000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0052ef320 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.389000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.399000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.399000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0052ef530 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.399000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.409000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.409000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0048563e0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.409000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.430000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:26.430000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c005c82c00 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:44:26.430000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:44:26.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.56:22-139.178.89.65:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:26.621642 systemd[1]: Started sshd@12-10.128.0.56:22-139.178.89.65:45308.service. Mar 17 18:44:26.691394 kubelet[2083]: I0317 18:44:26.691268 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:44:26.765000 audit[4372]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:26.765000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdeb44fd10 a2=0 a3=7ffdeb44fcfc items=0 ppid=2216 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:26.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:26.770000 audit[4372]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:26.770000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdeb44fd10 a2=0 a3=7ffdeb44fcfc items=0 ppid=2216 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:26.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:26.934000 audit[4369]: USER_ACCT pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:26.937010 sshd[4369]: Accepted publickey for core from 139.178.89.65 port 45308 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:26.937000 audit[4369]: CRED_ACQ pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:26.937000 audit[4369]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d88f850 a2=3 a3=0 items=0 ppid=1 pid=4369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:26.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:26.939434 sshd[4369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:26.954113 systemd-logind[1212]: New session 10 of user core. Mar 17 18:44:26.955630 systemd[1]: Started session-10.scope. Mar 17 18:44:26.967000 audit[4369]: USER_START pid=4369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:26.970000 audit[4373]: CRED_ACQ pid=4373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:27.285876 sshd[4369]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:27.286000 audit[4369]: USER_END pid=4369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:27.286000 audit[4369]: CRED_DISP pid=4369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:27.290486 systemd[1]: sshd@12-10.128.0.56:22-139.178.89.65:45308.service: Deactivated successfully. Mar 17 18:44:27.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.56:22-139.178.89.65:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:27.291722 systemd[1]: session-10.scope: Deactivated successfully. Mar 17 18:44:27.292736 systemd-logind[1212]: Session 10 logged out. Waiting for processes to exit. Mar 17 18:44:27.294164 systemd-logind[1212]: Removed session 10. Mar 17 18:44:30.165208 env[1222]: time="2025-03-17T18:44:30.165143810Z" level=info msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" Mar 17 18:44:30.257221 kubelet[2083]: I0317 18:44:30.256263 2083 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.227 [WARNING][4395] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eda150f1-13fa-4568-9ac6-402de2737c31", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0", Pod:"csi-node-driver-xnjrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali32a466ce520", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.228 [INFO][4395] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.228 [INFO][4395] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" iface="eth0" netns="" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.228 [INFO][4395] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.228 [INFO][4395] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.280 [INFO][4402] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.281 [INFO][4402] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.281 [INFO][4402] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.302 [WARNING][4402] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.302 [INFO][4402] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.306 [INFO][4402] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:30.314694 env[1222]: 2025-03-17 18:44:30.308 [INFO][4395] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.315868 env[1222]: time="2025-03-17T18:44:30.315813648Z" level=info msg="TearDown network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" successfully" Mar 17 18:44:30.316038 env[1222]: time="2025-03-17T18:44:30.316006308Z" level=info msg="StopPodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" returns successfully" Mar 17 18:44:30.320397 env[1222]: time="2025-03-17T18:44:30.320341194Z" level=info msg="RemovePodSandbox for \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" Mar 17 18:44:30.320397 env[1222]: time="2025-03-17T18:44:30.320421596Z" level=info msg="Forcibly stopping sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\"" Mar 17 18:44:30.378000 audit[4429]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:30.378000 audit[4429]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc6236e90 a2=0 a3=7fffc6236e7c items=0 ppid=2216 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:30.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:30.387000 audit[4429]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:44:30.387000 audit[4429]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffc6236e90 a2=0 a3=7fffc6236e7c items=0 ppid=2216 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:30.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.421 [WARNING][4425] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eda150f1-13fa-4568-9ac6-402de2737c31", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"73a57077050b4743dfb8b28cce3b1d0eeac514a6b2d169ec3aa14b2673a5e6a0", Pod:"csi-node-driver-xnjrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali32a466ce520", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.422 [INFO][4425] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.422 [INFO][4425] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" iface="eth0" netns="" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.422 [INFO][4425] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.422 [INFO][4425] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.448 [INFO][4432] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.448 [INFO][4432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.448 [INFO][4432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.460 [WARNING][4432] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.460 [INFO][4432] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" HandleID="k8s-pod-network.a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-csi--node--driver--xnjrg-eth0" Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.462 [INFO][4432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:30.465162 env[1222]: 2025-03-17 18:44:30.463 [INFO][4425] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692" Mar 17 18:44:30.467128 env[1222]: time="2025-03-17T18:44:30.465112429Z" level=info msg="TearDown network for sandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" successfully" Mar 17 18:44:30.472675 env[1222]: time="2025-03-17T18:44:30.472602198Z" level=info msg="RemovePodSandbox \"a75816d5c0995582ab4d20b6a33f1ad5172b559690a54eb072042f6032f13692\" returns successfully" Mar 17 18:44:30.473449 env[1222]: time="2025-03-17T18:44:30.473327334Z" level=info msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.534 [WARNING][4451] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb", Pod:"coredns-6f6b679f8f-k4skw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali32086d51898", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.534 [INFO][4451] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.534 [INFO][4451] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" iface="eth0" netns="" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.534 [INFO][4451] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.535 [INFO][4451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.618 [INFO][4457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.619 [INFO][4457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.619 [INFO][4457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.648 [WARNING][4457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.648 [INFO][4457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.651 [INFO][4457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:30.654086 env[1222]: 2025-03-17 18:44:30.652 [INFO][4451] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.655060 env[1222]: time="2025-03-17T18:44:30.654137183Z" level=info msg="TearDown network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" successfully" Mar 17 18:44:30.655060 env[1222]: time="2025-03-17T18:44:30.654182050Z" level=info msg="StopPodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" returns successfully" Mar 17 18:44:30.655060 env[1222]: time="2025-03-17T18:44:30.654846286Z" level=info msg="RemovePodSandbox for \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" Mar 17 18:44:30.655060 env[1222]: time="2025-03-17T18:44:30.654890665Z" level=info msg="Forcibly stopping sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\"" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.722 [WARNING][4476] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a63c5f49-7ec7-47bb-ad9e-77a20d2eb0bd", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"1d0093d35fd81820ae780017c58d6a76ded2ed542b00674e9f5d9c5096c479cb", Pod:"coredns-6f6b679f8f-k4skw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali32086d51898", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.723 [INFO][4476] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.723 [INFO][4476] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" iface="eth0" netns="" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.723 [INFO][4476] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.723 [INFO][4476] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.770 [INFO][4482] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.770 [INFO][4482] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.770 [INFO][4482] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.779 [WARNING][4482] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.779 [INFO][4482] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" HandleID="k8s-pod-network.26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--k4skw-eth0" Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.782 [INFO][4482] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:30.785552 env[1222]: 2025-03-17 18:44:30.783 [INFO][4476] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8" Mar 17 18:44:30.786463 env[1222]: time="2025-03-17T18:44:30.785601570Z" level=info msg="TearDown network for sandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" successfully" Mar 17 18:44:30.793048 env[1222]: time="2025-03-17T18:44:30.792936017Z" level=info msg="RemovePodSandbox \"26c37da9e3d0a1ad0d048bed7d3769b31560edd5436b44409166468b1e8f84c8\" returns successfully" Mar 17 18:44:30.793838 env[1222]: time="2025-03-17T18:44:30.793788299Z" level=info msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.891 [WARNING][4500] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0", GenerateName:"calico-kube-controllers-59d85f849c-", Namespace:"calico-system", SelfLink:"", UID:"c4025da7-6b6d-4efc-b29e-75e68b9ec285", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59d85f849c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc", Pod:"calico-kube-controllers-59d85f849c-tbgkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1685889963b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.891 [INFO][4500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.891 [INFO][4500] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" iface="eth0" netns="" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.891 [INFO][4500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.891 [INFO][4500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.940 [INFO][4506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.941 [INFO][4506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.941 [INFO][4506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.955 [WARNING][4506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.955 [INFO][4506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.957 [INFO][4506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:30.960515 env[1222]: 2025-03-17 18:44:30.958 [INFO][4500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:30.961237 env[1222]: time="2025-03-17T18:44:30.960564712Z" level=info msg="TearDown network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" successfully" Mar 17 18:44:30.961237 env[1222]: time="2025-03-17T18:44:30.960608645Z" level=info msg="StopPodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" returns successfully" Mar 17 18:44:30.961934 env[1222]: time="2025-03-17T18:44:30.961887002Z" level=info msg="RemovePodSandbox for \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" Mar 17 18:44:30.962110 env[1222]: time="2025-03-17T18:44:30.961940823Z" level=info msg="Forcibly stopping sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\"" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.070 [WARNING][4526] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0", GenerateName:"calico-kube-controllers-59d85f849c-", Namespace:"calico-system", SelfLink:"", UID:"c4025da7-6b6d-4efc-b29e-75e68b9ec285", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59d85f849c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"d1c542e9536bde9742f494a71d41ab608c77bea1cdf6f174a0e526f0d30d69cc", Pod:"calico-kube-controllers-59d85f849c-tbgkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1685889963b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.071 [INFO][4526] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.071 [INFO][4526] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" iface="eth0" netns="" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.071 [INFO][4526] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.071 [INFO][4526] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.115 [INFO][4534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.116 [INFO][4534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.116 [INFO][4534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.127 [WARNING][4534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.127 [INFO][4534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" HandleID="k8s-pod-network.8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--kube--controllers--59d85f849c--tbgkt-eth0" Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.131 [INFO][4534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:31.135057 env[1222]: 2025-03-17 18:44:31.133 [INFO][4526] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54" Mar 17 18:44:31.135057 env[1222]: time="2025-03-17T18:44:31.135004885Z" level=info msg="TearDown network for sandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" successfully" Mar 17 18:44:31.141393 env[1222]: time="2025-03-17T18:44:31.141292851Z" level=info msg="RemovePodSandbox \"8d288d4bb523b8e9c4f0bee17fa4b664fbeebf9c409edd1fbc19e04663076d54\" returns successfully" Mar 17 18:44:31.142072 env[1222]: time="2025-03-17T18:44:31.142018156Z" level=info msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.222 [WARNING][4552] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9288f0af-cbe0-428a-9ea2-660d440794e8", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d", Pod:"coredns-6f6b679f8f-58v75", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali059fded77ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.223 [INFO][4552] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.223 [INFO][4552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" iface="eth0" netns="" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.223 [INFO][4552] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.223 [INFO][4552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.272 [INFO][4558] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.272 [INFO][4558] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.272 [INFO][4558] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.284 [WARNING][4558] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.284 [INFO][4558] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.286 [INFO][4558] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:31.289156 env[1222]: 2025-03-17 18:44:31.287 [INFO][4552] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.290581 env[1222]: time="2025-03-17T18:44:31.290523900Z" level=info msg="TearDown network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" successfully" Mar 17 18:44:31.290740 env[1222]: time="2025-03-17T18:44:31.290712854Z" level=info msg="StopPodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" returns successfully" Mar 17 18:44:31.291638 env[1222]: time="2025-03-17T18:44:31.291589286Z" level=info msg="RemovePodSandbox for \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" Mar 17 18:44:31.291809 env[1222]: time="2025-03-17T18:44:31.291642686Z" level=info msg="Forcibly stopping sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\"" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.367 [WARNING][4576] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9288f0af-cbe0-428a-9ea2-660d440794e8", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"4a4513bd2fd19e2160150abddc577d5c923f39bacb61723d93ecb1f271e7b10d", Pod:"coredns-6f6b679f8f-58v75", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali059fded77ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.367 [INFO][4576] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.367 [INFO][4576] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" iface="eth0" netns="" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.368 [INFO][4576] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.368 [INFO][4576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.411 [INFO][4582] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.412 [INFO][4582] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.412 [INFO][4582] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.431 [WARNING][4582] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.431 [INFO][4582] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" HandleID="k8s-pod-network.38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--58v75-eth0" Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.434 [INFO][4582] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:31.437969 env[1222]: 2025-03-17 18:44:31.436 [INFO][4576] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215" Mar 17 18:44:31.439202 env[1222]: time="2025-03-17T18:44:31.439144379Z" level=info msg="TearDown network for sandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" successfully" Mar 17 18:44:31.447456 env[1222]: time="2025-03-17T18:44:31.447349812Z" level=info msg="RemovePodSandbox \"38c41ffce8eb8825188439868b6a1a0a0b49829337dddfedb32fc32a738fc215\" returns successfully" Mar 17 18:44:31.448369 env[1222]: time="2025-03-17T18:44:31.448327865Z" level=info msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" Mar 17 18:44:31.481353 kernel: kauditd_printk_skb: 37 callbacks suppressed Mar 17 18:44:31.481684 kernel: audit: type=1400 audit(1742237071.469:1333): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.469000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.469000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f640 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.540469 kernel: audit: type=1300 audit(1742237071.469:1333): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f640 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.540664 kernel: audit: type=1327 audit(1742237071.469:1333): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.593189 kernel: audit: type=1400 audit(1742237071.475:1334): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.475000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.475000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f7e0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.630429 kernel: audit: type=1300 audit(1742237071.475:1334): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f7e0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.661458 kernel: audit: type=1327 audit(1742237071.475:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.475000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.723771 kernel: audit: type=1400 audit(1742237071.475:1335): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.723972 kernel: audit: type=1300 audit(1742237071.475:1335): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f800 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.475000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f800 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.783495 kernel: audit: type=1327 audit(1742237071.475:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.783699 kernel: audit: type=1400 audit(1742237071.486:1336): avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.486000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:44:31.486000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002862e20 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:44:31.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.571 [WARNING][4601] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"296922d6-2029-455a-8726-e8a75a73aaad", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a", Pod:"calico-apiserver-77588b4d96-2qpnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliee0fa3c51ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.571 [INFO][4601] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.571 [INFO][4601] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" iface="eth0" netns="" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.571 [INFO][4601] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.571 [INFO][4601] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.735 [INFO][4607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.744 [INFO][4607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.744 [INFO][4607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.757 [WARNING][4607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.757 [INFO][4607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.771 [INFO][4607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:31.786257 env[1222]: 2025-03-17 18:44:31.775 [INFO][4601] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.787492 env[1222]: time="2025-03-17T18:44:31.787344112Z" level=info msg="TearDown network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" successfully" Mar 17 18:44:31.787492 env[1222]: time="2025-03-17T18:44:31.787396816Z" level=info msg="StopPodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" returns successfully" Mar 17 18:44:31.788101 env[1222]: time="2025-03-17T18:44:31.788058269Z" level=info msg="RemovePodSandbox for \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" Mar 17 18:44:31.788241 env[1222]: time="2025-03-17T18:44:31.788110955Z" level=info msg="Forcibly stopping sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\"" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.887 [WARNING][4625] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"296922d6-2029-455a-8726-e8a75a73aaad", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"974817d4541849d1c374a6810f2b23ff27dbf0975e231e7b313329824e615e6a", Pod:"calico-apiserver-77588b4d96-2qpnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliee0fa3c51ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.888 [INFO][4625] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.888 [INFO][4625] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" iface="eth0" netns="" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.888 [INFO][4625] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.888 [INFO][4625] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.918 [INFO][4631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.919 [INFO][4631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.919 [INFO][4631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.930 [WARNING][4631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.930 [INFO][4631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" HandleID="k8s-pod-network.00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--2qpnh-eth0" Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.932 [INFO][4631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:31.934988 env[1222]: 2025-03-17 18:44:31.933 [INFO][4625] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4" Mar 17 18:44:31.936104 env[1222]: time="2025-03-17T18:44:31.934992808Z" level=info msg="TearDown network for sandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" successfully" Mar 17 18:44:31.940903 env[1222]: time="2025-03-17T18:44:31.940827401Z" level=info msg="RemovePodSandbox \"00f7ee62789b4ebebd89b50f89ea1102100ab7f446697af1cae9134f508a62c4\" returns successfully" Mar 17 18:44:31.941890 env[1222]: time="2025-03-17T18:44:31.941847980Z" level=info msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.000 [WARNING][4649] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b1d5a2a-cbd3-47f6-b41e-827638039dfd", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194", Pod:"calico-apiserver-77588b4d96-djlk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif2359b33e23", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.000 [INFO][4649] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.000 [INFO][4649] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" iface="eth0" netns="" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.000 [INFO][4649] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.000 [INFO][4649] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.034 [INFO][4655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.035 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.035 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.045 [WARNING][4655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.046 [INFO][4655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.048 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:32.051358 env[1222]: 2025-03-17 18:44:32.050 [INFO][4649] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.052354 env[1222]: time="2025-03-17T18:44:32.051374275Z" level=info msg="TearDown network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" successfully" Mar 17 18:44:32.052354 env[1222]: time="2025-03-17T18:44:32.051455794Z" level=info msg="StopPodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" returns successfully" Mar 17 18:44:32.052528 env[1222]: time="2025-03-17T18:44:32.052340890Z" level=info msg="RemovePodSandbox for \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" Mar 17 18:44:32.052687 env[1222]: time="2025-03-17T18:44:32.052444084Z" level=info msg="Forcibly stopping sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\"" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.106 [WARNING][4674] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0", GenerateName:"calico-apiserver-77588b4d96-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b1d5a2a-cbd3-47f6-b41e-827638039dfd", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77588b4d96", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-97dda5cd7993326d1850.c.flatcar-212911.internal", ContainerID:"5da32ee54ba90a151b0c9f710e1c88838790b76d26633d045778533227cce194", Pod:"calico-apiserver-77588b4d96-djlk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif2359b33e23", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.107 [INFO][4674] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.107 [INFO][4674] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" iface="eth0" netns="" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.107 [INFO][4674] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.107 [INFO][4674] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.140 [INFO][4680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.141 [INFO][4680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.141 [INFO][4680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.149 [WARNING][4680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.149 [INFO][4680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" HandleID="k8s-pod-network.39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Workload="ci--3510--3--7--97dda5cd7993326d1850.c.flatcar--212911.internal-k8s-calico--apiserver--77588b4d96--djlk9-eth0" Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.151 [INFO][4680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:44:32.155925 env[1222]: 2025-03-17 18:44:32.153 [INFO][4674] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8" Mar 17 18:44:32.155925 env[1222]: time="2025-03-17T18:44:32.155342009Z" level=info msg="TearDown network for sandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" successfully" Mar 17 18:44:32.161744 env[1222]: time="2025-03-17T18:44:32.161663643Z" level=info msg="RemovePodSandbox \"39f4b1c98e85e1157873c9ca4bd34435db168e99c8c627d3a0c98fcd9e1ef7c8\" returns successfully" Mar 17 18:44:32.334444 systemd[1]: Started sshd@13-10.128.0.56:22-139.178.89.65:47510.service. Mar 17 18:44:32.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.56:22-139.178.89.65:47510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:32.632000 audit[4687]: USER_ACCT pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.635048 sshd[4687]: Accepted publickey for core from 139.178.89.65 port 47510 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:32.635000 audit[4687]: CRED_ACQ pid=4687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.635000 audit[4687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd48826010 a2=3 a3=0 items=0 ppid=1 pid=4687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:32.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:32.636806 sshd[4687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:32.649549 systemd[1]: Started session-11.scope. Mar 17 18:44:32.651496 systemd-logind[1212]: New session 11 of user core. Mar 17 18:44:32.674000 audit[4687]: USER_START pid=4687 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.677000 audit[4689]: CRED_ACQ pid=4689 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.946940 sshd[4687]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:32.949000 audit[4687]: USER_END pid=4687 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.949000 audit[4687]: CRED_DISP pid=4687 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:32.952491 systemd-logind[1212]: Session 11 logged out. Waiting for processes to exit. Mar 17 18:44:32.952674 systemd[1]: sshd@13-10.128.0.56:22-139.178.89.65:47510.service: Deactivated successfully. Mar 17 18:44:32.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.56:22-139.178.89.65:47510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:32.954014 systemd[1]: session-11.scope: Deactivated successfully. Mar 17 18:44:32.955574 systemd-logind[1212]: Removed session 11. Mar 17 18:44:37.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.56:22-139.178.89.65:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:37.993373 systemd[1]: Started sshd@14-10.128.0.56:22-139.178.89.65:47522.service. Mar 17 18:44:38.013307 kernel: kauditd_printk_skb: 13 callbacks suppressed Mar 17 18:44:38.013462 kernel: audit: type=1130 audit(1742237077.993:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.56:22-139.178.89.65:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:38.294000 audit[4701]: USER_ACCT pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.325232 sshd[4701]: Accepted publickey for core from 139.178.89.65 port 47522 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:38.325705 kernel: audit: type=1101 audit(1742237078.294:1347): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.326705 sshd[4701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:38.334658 systemd[1]: Started session-12.scope. Mar 17 18:44:38.336684 systemd-logind[1212]: New session 12 of user core. Mar 17 18:44:38.325000 audit[4701]: CRED_ACQ pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.369438 kernel: audit: type=1103 audit(1742237078.325:1348): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.395443 kernel: audit: type=1006 audit(1742237078.325:1349): pid=4701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Mar 17 18:44:38.325000 audit[4701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4ffec00 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:38.431449 kernel: audit: type=1300 audit(1742237078.325:1349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4ffec00 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:38.325000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:38.451613 kernel: audit: type=1327 audit(1742237078.325:1349): proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:38.346000 audit[4701]: USER_START pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.484587 kernel: audit: type=1105 audit(1742237078.346:1350): pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.349000 audit[4703]: CRED_ACQ pid=4703 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.510555 kernel: audit: type=1103 audit(1742237078.349:1351): pid=4703 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.637086 sshd[4701]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:38.672615 kernel: audit: type=1106 audit(1742237078.639:1352): pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.639000 audit[4701]: USER_END pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.674670 systemd[1]: sshd@14-10.128.0.56:22-139.178.89.65:47522.service: Deactivated successfully. Mar 17 18:44:38.675878 systemd[1]: session-12.scope: Deactivated successfully. Mar 17 18:44:38.676656 systemd-logind[1212]: Session 12 logged out. Waiting for processes to exit. Mar 17 18:44:38.640000 audit[4701]: CRED_DISP pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:38.690496 systemd-logind[1212]: Removed session 12. Mar 17 18:44:38.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.56:22-139.178.89.65:47522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:38.702559 kernel: audit: type=1104 audit(1742237078.640:1353): pid=4701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:39.536577 systemd[1]: run-containerd-runc-k8s.io-c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5-runc.bSB4V3.mount: Deactivated successfully. Mar 17 18:44:43.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.56:22-139.178.89.65:36832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:43.684875 systemd[1]: Started sshd@15-10.128.0.56:22-139.178.89.65:36832.service. Mar 17 18:44:43.690525 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:44:43.690832 kernel: audit: type=1130 audit(1742237083.683:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.56:22-139.178.89.65:36832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:43.981000 audit[4734]: USER_ACCT pid=4734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.012940 sshd[4734]: Accepted publickey for core from 139.178.89.65 port 36832 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:44.013440 kernel: audit: type=1101 audit(1742237083.981:1356): pid=4734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.011000 audit[4734]: CRED_ACQ pid=4734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.014598 sshd[4734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:44.038383 systemd[1]: Started session-13.scope. Mar 17 18:44:44.039819 systemd-logind[1212]: New session 13 of user core. Mar 17 18:44:44.058541 kernel: audit: type=1103 audit(1742237084.011:1357): pid=4734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.058718 kernel: audit: type=1006 audit(1742237084.012:1358): pid=4734 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Mar 17 18:44:44.012000 audit[4734]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0aa42d00 a2=3 a3=0 items=0 ppid=1 pid=4734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:44.059465 kernel: audit: type=1300 audit(1742237084.012:1358): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0aa42d00 a2=3 a3=0 items=0 ppid=1 pid=4734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:44.087681 kernel: audit: type=1327 audit(1742237084.012:1358): proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:44.012000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:44.051000 audit[4734]: USER_START pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.129191 kernel: audit: type=1105 audit(1742237084.051:1359): pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.129383 kernel: audit: type=1103 audit(1742237084.054:1360): pid=4736 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.054000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.342298 sshd[4734]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:44.343000 audit[4734]: USER_END pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.378442 kernel: audit: type=1106 audit(1742237084.343:1361): pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.354000 audit[4734]: CRED_DISP pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.387006 systemd[1]: sshd@15-10.128.0.56:22-139.178.89.65:36832.service: Deactivated successfully. Mar 17 18:44:44.388346 systemd[1]: session-13.scope: Deactivated successfully. Mar 17 18:44:44.404539 kernel: audit: type=1104 audit(1742237084.354:1362): pid=4734 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.56:22-139.178.89.65:36832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:44.403769 systemd-logind[1212]: Session 13 logged out. Waiting for processes to exit. Mar 17 18:44:44.407690 systemd[1]: Started sshd@16-10.128.0.56:22-139.178.89.65:36840.service. Mar 17 18:44:44.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.56:22-139.178.89.65:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:44.411823 systemd-logind[1212]: Removed session 13. Mar 17 18:44:44.702000 audit[4746]: USER_ACCT pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.705185 sshd[4746]: Accepted publickey for core from 139.178.89.65 port 36840 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:44.705000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.705000 audit[4746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeca74700 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:44.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:44.707246 sshd[4746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:44.714548 systemd[1]: Started session-14.scope. Mar 17 18:44:44.715605 systemd-logind[1212]: New session 14 of user core. Mar 17 18:44:44.723000 audit[4746]: USER_START pid=4746 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:44.725000 audit[4748]: CRED_ACQ pid=4748 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.048315 sshd[4746]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:45.048000 audit[4746]: USER_END pid=4746 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.048000 audit[4746]: CRED_DISP pid=4746 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.053855 systemd-logind[1212]: Session 14 logged out. Waiting for processes to exit. Mar 17 18:44:45.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.56:22-139.178.89.65:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:45.055800 systemd[1]: sshd@16-10.128.0.56:22-139.178.89.65:36840.service: Deactivated successfully. Mar 17 18:44:45.057161 systemd[1]: session-14.scope: Deactivated successfully. Mar 17 18:44:45.060215 systemd-logind[1212]: Removed session 14. Mar 17 18:44:45.097834 systemd[1]: Started sshd@17-10.128.0.56:22-139.178.89.65:36844.service. Mar 17 18:44:45.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.56:22-139.178.89.65:36844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:45.398000 audit[4756]: USER_ACCT pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.401182 sshd[4756]: Accepted publickey for core from 139.178.89.65 port 36844 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:45.400000 audit[4756]: CRED_ACQ pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.400000 audit[4756]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6088c070 a2=3 a3=0 items=0 ppid=1 pid=4756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:45.400000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:45.402594 sshd[4756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:45.411459 systemd[1]: Started session-15.scope. Mar 17 18:44:45.412368 systemd-logind[1212]: New session 15 of user core. Mar 17 18:44:45.424000 audit[4756]: USER_START pid=4756 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.427000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.717509 sshd[4756]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:45.718000 audit[4756]: USER_END pid=4756 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.718000 audit[4756]: CRED_DISP pid=4756 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:45.722605 systemd[1]: sshd@17-10.128.0.56:22-139.178.89.65:36844.service: Deactivated successfully. Mar 17 18:44:45.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.56:22-139.178.89.65:36844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:45.723920 systemd[1]: session-15.scope: Deactivated successfully. Mar 17 18:44:45.726458 systemd-logind[1212]: Session 15 logged out. Waiting for processes to exit. Mar 17 18:44:45.728318 systemd-logind[1212]: Removed session 15. Mar 17 18:44:50.766258 systemd[1]: Started sshd@18-10.128.0.56:22-139.178.89.65:36846.service. Mar 17 18:44:50.798363 kernel: kauditd_printk_skb: 23 callbacks suppressed Mar 17 18:44:50.798507 kernel: audit: type=1130 audit(1742237090.765:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.56:22-139.178.89.65:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:50.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.56:22-139.178.89.65:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:51.069000 audit[4778]: USER_ACCT pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.101696 kernel: audit: type=1101 audit(1742237091.069:1383): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.101818 sshd[4778]: Accepted publickey for core from 139.178.89.65 port 36846 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:51.102882 sshd[4778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:51.100000 audit[4778]: CRED_ACQ pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.114568 systemd[1]: Started session-16.scope. Mar 17 18:44:51.117154 systemd-logind[1212]: New session 16 of user core. Mar 17 18:44:51.145203 kernel: audit: type=1103 audit(1742237091.100:1384): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.145679 kernel: audit: type=1006 audit(1742237091.100:1385): pid=4778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Mar 17 18:44:51.145754 kernel: audit: type=1300 audit(1742237091.100:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb693e3d0 a2=3 a3=0 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:51.100000 audit[4778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb693e3d0 a2=3 a3=0 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:51.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:51.183043 kernel: audit: type=1327 audit(1742237091.100:1385): proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:51.183203 kernel: audit: type=1105 audit(1742237091.122:1386): pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.122000 audit[4778]: USER_START pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.127000 audit[4782]: CRED_ACQ pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.239847 kernel: audit: type=1103 audit(1742237091.127:1387): pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.280252 systemd[1]: run-containerd-runc-k8s.io-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135-runc.Zuyxyg.mount: Deactivated successfully. Mar 17 18:44:51.450943 sshd[4778]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:51.452000 audit[4778]: USER_END pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.457320 systemd[1]: sshd@18-10.128.0.56:22-139.178.89.65:36846.service: Deactivated successfully. Mar 17 18:44:51.458826 systemd[1]: session-16.scope: Deactivated successfully. Mar 17 18:44:51.461256 systemd-logind[1212]: Session 16 logged out. Waiting for processes to exit. Mar 17 18:44:51.463069 systemd-logind[1212]: Removed session 16. Mar 17 18:44:51.452000 audit[4778]: CRED_DISP pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.487552 kernel: audit: type=1106 audit(1742237091.452:1388): pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.487660 kernel: audit: type=1104 audit(1742237091.452:1389): pid=4778 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:51.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.56:22-139.178.89.65:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:56.498066 systemd[1]: Started sshd@19-10.128.0.56:22-139.178.89.65:55892.service. Mar 17 18:44:56.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.56:22-139.178.89.65:55892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:56.529117 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:44:56.529317 kernel: audit: type=1130 audit(1742237096.498:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.56:22-139.178.89.65:55892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:44:56.828274 kernel: audit: type=1101 audit(1742237096.795:1392): pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.795000 audit[4817]: USER_ACCT pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.826880 sshd[4817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:44:56.829863 sshd[4817]: Accepted publickey for core from 139.178.89.65 port 55892 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:44:56.825000 audit[4817]: CRED_ACQ pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.857529 systemd-logind[1212]: New session 17 of user core. Mar 17 18:44:56.861134 systemd[1]: Started session-17.scope. Mar 17 18:44:56.872968 kernel: audit: type=1103 audit(1742237096.825:1393): pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.873098 kernel: audit: type=1006 audit(1742237096.825:1394): pid=4817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Mar 17 18:44:56.825000 audit[4817]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7697b6c0 a2=3 a3=0 items=0 ppid=1 pid=4817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:56.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:56.912280 kernel: audit: type=1300 audit(1742237096.825:1394): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7697b6c0 a2=3 a3=0 items=0 ppid=1 pid=4817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:44:56.912927 kernel: audit: type=1327 audit(1742237096.825:1394): proctitle=737368643A20636F7265205B707269765D Mar 17 18:44:56.913006 kernel: audit: type=1105 audit(1742237096.875:1395): pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.875000 audit[4817]: USER_START pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.884000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:56.969513 kernel: audit: type=1103 audit(1742237096.884:1396): pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:57.148870 sshd[4817]: pam_unix(sshd:session): session closed for user core Mar 17 18:44:57.151000 audit[4817]: USER_END pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:57.185995 kernel: audit: type=1106 audit(1742237097.151:1397): pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:57.186222 kernel: audit: type=1104 audit(1742237097.151:1398): pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:57.151000 audit[4817]: CRED_DISP pid=4817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:44:57.188235 systemd[1]: sshd@19-10.128.0.56:22-139.178.89.65:55892.service: Deactivated successfully. Mar 17 18:44:57.189539 systemd[1]: session-17.scope: Deactivated successfully. Mar 17 18:44:57.191596 systemd-logind[1212]: Session 17 logged out. Waiting for processes to exit. Mar 17 18:44:57.193966 systemd-logind[1212]: Removed session 17. Mar 17 18:44:57.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.56:22-139.178.89.65:55892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:02.198753 systemd[1]: Started sshd@20-10.128.0.56:22-139.178.89.65:34640.service. Mar 17 18:45:02.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.56:22-139.178.89.65:34640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:02.206602 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:45:02.206791 kernel: audit: type=1130 audit(1742237102.197:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.56:22-139.178.89.65:34640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:02.531000 audit[4829]: USER_ACCT pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.562778 sshd[4829]: Accepted publickey for core from 139.178.89.65 port 34640 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:02.563436 kernel: audit: type=1101 audit(1742237102.531:1401): pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.563558 sshd[4829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:02.561000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.575167 systemd-logind[1212]: New session 18 of user core. Mar 17 18:45:02.575629 systemd[1]: Started session-18.scope. Mar 17 18:45:02.590435 kernel: audit: type=1103 audit(1742237102.561:1402): pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.561000 audit[4829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0d042e40 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:02.637185 kernel: audit: type=1006 audit(1742237102.561:1403): pid=4829 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Mar 17 18:45:02.637376 kernel: audit: type=1300 audit(1742237102.561:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0d042e40 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:02.561000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:02.651323 kernel: audit: type=1327 audit(1742237102.561:1403): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:02.651582 kernel: audit: type=1105 audit(1742237102.589:1404): pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.589000 audit[4829]: USER_START pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.594000 audit[4831]: CRED_ACQ pid=4831 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.705938 kernel: audit: type=1103 audit(1742237102.594:1405): pid=4831 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.914383 sshd[4829]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:02.915000 audit[4829]: USER_END pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.950435 kernel: audit: type=1106 audit(1742237102.915:1406): pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.953801 systemd[1]: sshd@20-10.128.0.56:22-139.178.89.65:34640.service: Deactivated successfully. Mar 17 18:45:02.955126 systemd[1]: session-18.scope: Deactivated successfully. Mar 17 18:45:02.957727 systemd-logind[1212]: Session 18 logged out. Waiting for processes to exit. Mar 17 18:45:02.960346 systemd-logind[1212]: Removed session 18. Mar 17 18:45:02.949000 audit[4829]: CRED_DISP pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.990485 kernel: audit: type=1104 audit(1742237102.949:1407): pid=4829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:02.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.56:22-139.178.89.65:34640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:07.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.56:22-139.178.89.65:34652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:07.960371 systemd[1]: Started sshd@21-10.128.0.56:22-139.178.89.65:34652.service. Mar 17 18:45:07.966272 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:45:07.966417 kernel: audit: type=1130 audit(1742237107.960:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.56:22-139.178.89.65:34652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:08.264000 audit[4842]: USER_ACCT pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.295330 sshd[4842]: Accepted publickey for core from 139.178.89.65 port 34652 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:08.295833 kernel: audit: type=1101 audit(1742237108.264:1410): pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.296157 sshd[4842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:08.294000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.307758 systemd[1]: Started session-19.scope. Mar 17 18:45:08.309018 systemd-logind[1212]: New session 19 of user core. Mar 17 18:45:08.325725 kernel: audit: type=1103 audit(1742237108.294:1411): pid=4842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.326077 kernel: audit: type=1006 audit(1742237108.295:1412): pid=4842 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Mar 17 18:45:08.344443 kernel: audit: type=1300 audit(1742237108.295:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6fa2c230 a2=3 a3=0 items=0 ppid=1 pid=4842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:08.295000 audit[4842]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6fa2c230 a2=3 a3=0 items=0 ppid=1 pid=4842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:08.295000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:08.326000 audit[4842]: USER_START pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.410860 kernel: audit: type=1327 audit(1742237108.295:1412): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:08.411049 kernel: audit: type=1105 audit(1742237108.326:1413): pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.411126 kernel: audit: type=1103 audit(1742237108.330:1414): pid=4844 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.330000 audit[4844]: CRED_ACQ pid=4844 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.611366 sshd[4842]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:08.612000 audit[4842]: USER_END pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.618446 systemd[1]: sshd@21-10.128.0.56:22-139.178.89.65:34652.service: Deactivated successfully. Mar 17 18:45:08.619725 systemd[1]: session-19.scope: Deactivated successfully. Mar 17 18:45:08.622266 systemd-logind[1212]: Session 19 logged out. Waiting for processes to exit. Mar 17 18:45:08.623859 systemd-logind[1212]: Removed session 19. Mar 17 18:45:08.650457 kernel: audit: type=1106 audit(1742237108.612:1415): pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.650666 kernel: audit: type=1104 audit(1742237108.612:1416): pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.612000 audit[4842]: CRED_DISP pid=4842 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.56:22-139.178.89.65:34652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:08.678932 systemd[1]: Started sshd@22-10.128.0.56:22-139.178.89.65:34658.service. Mar 17 18:45:08.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.56:22-139.178.89.65:34658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:08.970000 audit[4854]: USER_ACCT pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.972733 sshd[4854]: Accepted publickey for core from 139.178.89.65 port 34658 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:08.973000 audit[4854]: CRED_ACQ pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.973000 audit[4854]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a6230e0 a2=3 a3=0 items=0 ppid=1 pid=4854 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:08.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:08.975252 sshd[4854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:08.981346 systemd-logind[1212]: New session 20 of user core. Mar 17 18:45:08.982879 systemd[1]: Started session-20.scope. Mar 17 18:45:08.990000 audit[4854]: USER_START pid=4854 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:08.993000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.373542 sshd[4854]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:09.374000 audit[4854]: USER_END pid=4854 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.374000 audit[4854]: CRED_DISP pid=4854 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.377972 systemd[1]: sshd@22-10.128.0.56:22-139.178.89.65:34658.service: Deactivated successfully. Mar 17 18:45:09.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.56:22-139.178.89.65:34658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:09.379264 systemd[1]: session-20.scope: Deactivated successfully. Mar 17 18:45:09.380266 systemd-logind[1212]: Session 20 logged out. Waiting for processes to exit. Mar 17 18:45:09.381654 systemd-logind[1212]: Removed session 20. Mar 17 18:45:09.423329 systemd[1]: Started sshd@23-10.128.0.56:22-139.178.89.65:34664.service. Mar 17 18:45:09.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.56:22-139.178.89.65:34664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:09.721000 audit[4863]: USER_ACCT pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.723780 sshd[4863]: Accepted publickey for core from 139.178.89.65 port 34664 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:09.723000 audit[4863]: CRED_ACQ pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.723000 audit[4863]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0a385750 a2=3 a3=0 items=0 ppid=1 pid=4863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:09.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:09.725308 sshd[4863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:09.732745 systemd[1]: Started session-21.scope. Mar 17 18:45:09.733796 systemd-logind[1212]: New session 21 of user core. Mar 17 18:45:09.741000 audit[4863]: USER_START pid=4863 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:09.743000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:11.984000 audit[4895]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:11.984000 audit[4895]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcc245fd50 a2=0 a3=7ffcc245fd3c items=0 ppid=2216 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:11.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:11.988000 audit[4895]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:11.988000 audit[4895]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcc245fd50 a2=0 a3=0 items=0 ppid=2216 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:11.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:12.017430 sshd[4863]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:12.018000 audit[4863]: USER_END pid=4863 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.018000 audit[4863]: CRED_DISP pid=4863 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.56:22-139.178.89.65:34664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:12.024172 systemd[1]: sshd@23-10.128.0.56:22-139.178.89.65:34664.service: Deactivated successfully. Mar 17 18:45:12.025487 systemd[1]: session-21.scope: Deactivated successfully. Mar 17 18:45:12.026261 systemd-logind[1212]: Session 21 logged out. Waiting for processes to exit. Mar 17 18:45:12.029189 systemd-logind[1212]: Removed session 21. Mar 17 18:45:12.035000 audit[4897]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=4897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:12.035000 audit[4897]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdaf19cca0 a2=0 a3=7ffdaf19cc8c items=0 ppid=2216 pid=4897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:12.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:12.041000 audit[4897]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:12.041000 audit[4897]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdaf19cca0 a2=0 a3=0 items=0 ppid=2216 pid=4897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:12.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:12.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.56:22-139.178.89.65:38496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:12.061889 systemd[1]: Started sshd@24-10.128.0.56:22-139.178.89.65:38496.service. Mar 17 18:45:12.359000 audit[4900]: USER_ACCT pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.361256 sshd[4900]: Accepted publickey for core from 139.178.89.65 port 38496 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:12.361000 audit[4900]: CRED_ACQ pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.361000 audit[4900]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07686d70 a2=3 a3=0 items=0 ppid=1 pid=4900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:12.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:12.363490 sshd[4900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:12.373992 systemd[1]: Started session-22.scope. Mar 17 18:45:12.374811 systemd-logind[1212]: New session 22 of user core. Mar 17 18:45:12.388000 audit[4900]: USER_START pid=4900 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.392000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.811455 sshd[4900]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:12.813000 audit[4900]: USER_END pid=4900 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.813000 audit[4900]: CRED_DISP pid=4900 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:12.817150 systemd[1]: sshd@24-10.128.0.56:22-139.178.89.65:38496.service: Deactivated successfully. Mar 17 18:45:12.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.56:22-139.178.89.65:38496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:12.818492 systemd[1]: session-22.scope: Deactivated successfully. Mar 17 18:45:12.819551 systemd-logind[1212]: Session 22 logged out. Waiting for processes to exit. Mar 17 18:45:12.820965 systemd-logind[1212]: Removed session 22. Mar 17 18:45:12.860579 systemd[1]: Started sshd@25-10.128.0.56:22-139.178.89.65:38508.service. Mar 17 18:45:12.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.56:22-139.178.89.65:38508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:13.170717 kernel: kauditd_printk_skb: 47 callbacks suppressed Mar 17 18:45:13.170909 kernel: audit: type=1101 audit(1742237113.162:1450): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.162000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.170294 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:13.172149 sshd[4910]: Accepted publickey for core from 139.178.89.65 port 38508 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:13.182487 systemd[1]: Started session-23.scope. Mar 17 18:45:13.184504 systemd-logind[1212]: New session 23 of user core. Mar 17 18:45:13.168000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.224777 kernel: audit: type=1103 audit(1742237113.168:1451): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.224991 kernel: audit: type=1006 audit(1742237113.168:1452): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Mar 17 18:45:13.241280 kernel: audit: type=1300 audit(1742237113.168:1452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc25a1c60 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:13.168000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc25a1c60 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:13.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:13.279304 kernel: audit: type=1327 audit(1742237113.168:1452): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:13.279562 kernel: audit: type=1105 audit(1742237113.194:1453): pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.194000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.199000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.312550 kernel: audit: type=1103 audit(1742237113.199:1454): pid=4912 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.463345 sshd[4910]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:13.500000 kernel: audit: type=1106 audit(1742237113.464:1455): pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.464000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.500366 systemd[1]: sshd@25-10.128.0.56:22-139.178.89.65:38508.service: Deactivated successfully. Mar 17 18:45:13.465000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.501683 systemd[1]: session-23.scope: Deactivated successfully. Mar 17 18:45:13.504462 systemd-logind[1212]: Session 23 logged out. Waiting for processes to exit. Mar 17 18:45:13.506707 systemd-logind[1212]: Removed session 23. Mar 17 18:45:13.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.56:22-139.178.89.65:38508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:13.525634 kernel: audit: type=1104 audit(1742237113.465:1456): pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:13.525698 kernel: audit: type=1131 audit(1742237113.499:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.56:22-139.178.89.65:38508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:14.465000 audit[4135]: AVC avc: denied { watch } for pid=4135 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_43_54.557245212/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c226,c460 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c226,c460 tclass=file permissive=0 Mar 17 18:45:14.465000 audit[4135]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00142b6a0 a2=fc6 a3=0 items=0 ppid=3494 pid=4135 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c226,c460 key=(null) Mar 17 18:45:14.465000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:45:15.573000 audit[4174]: AVC avc: denied { watch } for pid=4174 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_43_54.3965524426/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c604,c978 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c604,c978 tclass=file permissive=0 Mar 17 18:45:15.573000 audit[4174]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d76b60 a2=fc6 a3=0 items=0 ppid=3637 pid=4174 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c604,c978 key=(null) Mar 17 18:45:15.573000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:45:18.510302 systemd[1]: Started sshd@26-10.128.0.56:22-139.178.89.65:38518.service. Mar 17 18:45:18.541275 kernel: kauditd_printk_skb: 6 callbacks suppressed Mar 17 18:45:18.541469 kernel: audit: type=1130 audit(1742237118.510:1460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.56:22-139.178.89.65:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:18.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.56:22-139.178.89.65:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:18.810000 audit[4922]: USER_ACCT pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.840502 kernel: audit: type=1101 audit(1742237118.810:1461): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.840628 sshd[4922]: Accepted publickey for core from 139.178.89.65 port 38518 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:18.841775 sshd[4922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:18.840000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.851659 systemd-logind[1212]: New session 24 of user core. Mar 17 18:45:18.852260 systemd[1]: Started session-24.scope. Mar 17 18:45:18.875016 kernel: audit: type=1103 audit(1742237118.840:1462): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.875166 kernel: audit: type=1006 audit(1742237118.840:1463): pid=4922 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Mar 17 18:45:18.840000 audit[4922]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd43cf350 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:18.890503 kernel: audit: type=1300 audit(1742237118.840:1463): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd43cf350 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:18.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:18.918440 kernel: audit: type=1327 audit(1742237118.840:1463): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:18.872000 audit[4922]: USER_START pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.960514 kernel: audit: type=1105 audit(1742237118.872:1464): pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.875000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:18.985140 kernel: audit: type=1103 audit(1742237118.875:1465): pid=4924 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:19.126215 sshd[4922]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:19.128000 audit[4922]: USER_END pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:19.131755 systemd-logind[1212]: Session 24 logged out. Waiting for processes to exit. Mar 17 18:45:19.134272 systemd[1]: sshd@26-10.128.0.56:22-139.178.89.65:38518.service: Deactivated successfully. Mar 17 18:45:19.135506 systemd[1]: session-24.scope: Deactivated successfully. Mar 17 18:45:19.138785 systemd-logind[1212]: Removed session 24. Mar 17 18:45:19.161454 kernel: audit: type=1106 audit(1742237119.128:1466): pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:19.161633 kernel: audit: type=1104 audit(1742237119.128:1467): pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:19.128000 audit[4922]: CRED_DISP pid=4922 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:19.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.56:22-139.178.89.65:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:19.824000 audit[4934]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:19.824000 audit[4934]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe9e7a8e20 a2=0 a3=7ffe9e7a8e0c items=0 ppid=2216 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:19.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:19.833000 audit[4934]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=4934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:45:19.833000 audit[4934]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe9e7a8e20 a2=0 a3=7ffe9e7a8e0c items=0 ppid=2216 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:19.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:45:21.257101 systemd[1]: run-containerd-runc-k8s.io-224ffdfb84cad40f35ce59a577b616b69f2e11685b31e9377a82389325391135-runc.e9ndBn.mount: Deactivated successfully. Mar 17 18:45:22.581635 systemd[1]: run-containerd-runc-k8s.io-c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5-runc.HhfmQB.mount: Deactivated successfully. Mar 17 18:45:24.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.56:22-139.178.89.65:39526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:24.176676 systemd[1]: Started sshd@27-10.128.0.56:22-139.178.89.65:39526.service. Mar 17 18:45:24.182778 kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 17 18:45:24.182898 kernel: audit: type=1130 audit(1742237124.175:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.56:22-139.178.89.65:39526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:24.478000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.482577 sshd[4978]: Accepted publickey for core from 139.178.89.65 port 39526 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:24.510528 kernel: audit: type=1101 audit(1742237124.478:1472): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.511105 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:24.508000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.520948 systemd[1]: Started session-25.scope. Mar 17 18:45:24.523450 systemd-logind[1212]: New session 25 of user core. Mar 17 18:45:24.545453 kernel: audit: type=1103 audit(1742237124.508:1473): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.567324 kernel: audit: type=1006 audit(1742237124.508:1474): pid=4978 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Mar 17 18:45:24.567584 kernel: audit: type=1300 audit(1742237124.508:1474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeba507ca0 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:24.508000 audit[4978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeba507ca0 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:24.594669 kernel: audit: type=1327 audit(1742237124.508:1474): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:24.508000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:24.533000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.546000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.663179 kernel: audit: type=1105 audit(1742237124.533:1475): pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.663365 kernel: audit: type=1103 audit(1742237124.546:1476): pid=4980 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.838751 sshd[4978]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:24.838000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.856721 systemd[1]: sshd@27-10.128.0.56:22-139.178.89.65:39526.service: Deactivated successfully. Mar 17 18:45:24.858051 systemd[1]: session-25.scope: Deactivated successfully. Mar 17 18:45:24.860248 systemd-logind[1212]: Session 25 logged out. Waiting for processes to exit. Mar 17 18:45:24.866001 systemd-logind[1212]: Removed session 25. Mar 17 18:45:24.839000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.900301 kernel: audit: type=1106 audit(1742237124.838:1477): pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.900482 kernel: audit: type=1104 audit(1742237124.839:1478): pid=4978 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:24.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.56:22-139.178.89.65:39526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:25.881000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:25.881000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00188fb00 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:25.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:25.886000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:25.886000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0e460 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:25.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:26.390000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.390000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00a2cb5a0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:26.390000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.390000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005771b60 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:26.390000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.390000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00581f350 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:26.401000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.401000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00581fda0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.401000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:26.410000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.410000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00b155ae0 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:26.432000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7311 scontext=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:26.432000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c005771d70 a2=fc6 a3=0 items=0 ppid=1777 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c856,c1000 key=(null) Mar 17 18:45:26.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3536002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:45:29.886127 systemd[1]: Started sshd@28-10.128.0.56:22-139.178.89.65:39540.service. Mar 17 18:45:29.903040 kernel: kauditd_printk_skb: 25 callbacks suppressed Mar 17 18:45:29.903228 kernel: audit: type=1130 audit(1742237129.889:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.56:22-139.178.89.65:39540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:29.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.56:22-139.178.89.65:39540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:30.187000 audit[4995]: USER_ACCT pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.193426 sshd[4995]: Accepted publickey for core from 139.178.89.65 port 39540 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:30.217434 kernel: audit: type=1101 audit(1742237130.187:1489): pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.219219 sshd[4995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:30.217000 audit[4995]: CRED_ACQ pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.229274 systemd[1]: Started session-26.scope. Mar 17 18:45:30.231353 systemd-logind[1212]: New session 26 of user core. Mar 17 18:45:30.246544 kernel: audit: type=1103 audit(1742237130.217:1490): pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.266430 kernel: audit: type=1006 audit(1742237130.218:1491): pid=4995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Mar 17 18:45:30.218000 audit[4995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe896d1f80 a2=3 a3=0 items=0 ppid=1 pid=4995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:30.218000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:30.306465 kernel: audit: type=1300 audit(1742237130.218:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe896d1f80 a2=3 a3=0 items=0 ppid=1 pid=4995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:30.306541 kernel: audit: type=1327 audit(1742237130.218:1491): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:30.248000 audit[4995]: USER_START pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.348426 kernel: audit: type=1105 audit(1742237130.248:1492): pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.272000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.372895 kernel: audit: type=1103 audit(1742237130.272:1493): pid=5000 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.519021 sshd[4995]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:30.520000 audit[4995]: USER_END pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.524762 systemd-logind[1212]: Session 26 logged out. Waiting for processes to exit. Mar 17 18:45:30.527048 systemd[1]: sshd@28-10.128.0.56:22-139.178.89.65:39540.service: Deactivated successfully. Mar 17 18:45:30.528295 systemd[1]: session-26.scope: Deactivated successfully. Mar 17 18:45:30.530735 systemd-logind[1212]: Removed session 26. Mar 17 18:45:30.520000 audit[4995]: CRED_DISP pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.579383 kernel: audit: type=1106 audit(1742237130.520:1494): pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.579598 kernel: audit: type=1104 audit(1742237130.520:1495): pid=4995 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:30.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.56:22-139.178.89.65:39540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:31.468000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:31.468000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f6a0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:31.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:31.474000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:31.474000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a0f6c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:31.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:31.475000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:31.475000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002863d40 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:31.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:31.485000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:45:31.485000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026de020 a2=fc6 a3=0 items=0 ppid=1800 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c615,c932 key=(null) Mar 17 18:45:31.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:45:35.598496 kernel: kauditd_printk_skb: 13 callbacks suppressed Mar 17 18:45:35.598712 kernel: audit: type=1130 audit(1742237135.566:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.56:22-139.178.89.65:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:35.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.56:22-139.178.89.65:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:35.567722 systemd[1]: Started sshd@29-10.128.0.56:22-139.178.89.65:57750.service. Mar 17 18:45:35.869000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.901032 sshd[5014]: Accepted publickey for core from 139.178.89.65 port 57750 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:45:35.901546 kernel: audit: type=1101 audit(1742237135.869:1502): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.902051 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:45:35.911629 systemd[1]: Started session-27.scope. Mar 17 18:45:35.912850 systemd-logind[1212]: New session 27 of user core. Mar 17 18:45:35.899000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.964299 kernel: audit: type=1103 audit(1742237135.899:1503): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.964500 kernel: audit: type=1006 audit(1742237135.899:1504): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Mar 17 18:45:35.899000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc263b1160 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:35.899000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:36.002237 kernel: audit: type=1300 audit(1742237135.899:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc263b1160 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:45:36.002463 kernel: audit: type=1327 audit(1742237135.899:1504): proctitle=737368643A20636F7265205B707269765D Mar 17 18:45:36.002529 kernel: audit: type=1105 audit(1742237135.943:1505): pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.943000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:35.946000 audit[5016]: CRED_ACQ pid=5016 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.059986 kernel: audit: type=1103 audit(1742237135.946:1506): pid=5016 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.199331 sshd[5014]: pam_unix(sshd:session): session closed for user core Mar 17 18:45:36.199000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.204916 systemd[1]: sshd@29-10.128.0.56:22-139.178.89.65:57750.service: Deactivated successfully. Mar 17 18:45:36.206200 systemd[1]: session-27.scope: Deactivated successfully. Mar 17 18:45:36.208434 systemd-logind[1212]: Session 27 logged out. Waiting for processes to exit. Mar 17 18:45:36.210363 systemd-logind[1212]: Removed session 27. Mar 17 18:45:36.199000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.236457 kernel: audit: type=1106 audit(1742237136.199:1507): pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.236554 kernel: audit: type=1104 audit(1742237136.199:1508): pid=5014 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:45:36.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.56:22-139.178.89.65:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:45:39.538494 systemd[1]: run-containerd-runc-k8s.io-c24b7477a72cf252c8a97793ff6b9d22551bcc374108a39d970ba3dd3ef937e5-runc.tWuZsp.mount: Deactivated successfully.