Feb 9 19:36:13.069657 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:36:13.069690 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:36:13.069704 kernel: BIOS-provided physical RAM map: Feb 9 19:36:13.069713 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:36:13.069722 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 9 19:36:13.069731 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 9 19:36:13.069745 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 9 19:36:13.069755 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 9 19:36:13.069764 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 9 19:36:13.069774 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 9 19:36:13.069784 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 9 19:36:13.069793 kernel: printk: bootconsole [earlyser0] enabled Feb 9 19:36:13.069802 kernel: NX (Execute Disable) protection: active Feb 9 19:36:13.069812 kernel: efi: EFI v2.70 by Microsoft Feb 9 19:36:13.069827 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 9 19:36:13.069838 kernel: random: crng init done Feb 9 19:36:13.069849 kernel: SMBIOS 3.1.0 present. Feb 9 19:36:13.069859 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 19:36:13.069870 kernel: Hypervisor detected: Microsoft Hyper-V Feb 9 19:36:13.069881 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 9 19:36:13.069892 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 9 19:36:13.069903 kernel: Hyper-V: Nested features: 0x1e0101 Feb 9 19:36:13.069915 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 9 19:36:13.069926 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 9 19:36:13.069937 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 9 19:36:13.069948 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 9 19:36:13.069960 kernel: tsc: Detected 2593.905 MHz processor Feb 9 19:36:13.069971 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:36:13.069983 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:36:13.069995 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 9 19:36:13.070007 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:36:13.070019 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 9 19:36:13.070032 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 9 19:36:13.070043 kernel: Using GB pages for direct mapping Feb 9 19:36:13.070060 kernel: Secure boot disabled Feb 9 19:36:13.070072 kernel: ACPI: Early table checksum verification disabled Feb 9 19:36:13.070084 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 9 19:36:13.070097 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070109 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070122 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 19:36:13.070141 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 9 19:36:13.070154 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070167 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070180 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070193 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070207 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070222 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070235 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:36:13.070248 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 9 19:36:13.070261 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 9 19:36:13.070274 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 9 19:36:13.070287 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 9 19:36:13.070300 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 9 19:36:13.070313 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 9 19:36:13.070328 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 9 19:36:13.070341 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 9 19:36:13.070355 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 9 19:36:13.070368 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 9 19:36:13.070381 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:36:13.070394 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:36:13.070407 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 9 19:36:13.070434 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 9 19:36:13.070447 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 9 19:36:13.070463 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 9 19:36:13.070476 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 9 19:36:13.070489 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 9 19:36:13.070502 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 9 19:36:13.070515 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 9 19:36:13.070528 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 9 19:36:13.070541 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 9 19:36:13.070554 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 9 19:36:13.070567 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 9 19:36:13.070583 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 9 19:36:13.070596 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 9 19:36:13.070609 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 9 19:36:13.070622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 9 19:36:13.070634 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 9 19:36:13.070645 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 9 19:36:13.070655 kernel: Zone ranges: Feb 9 19:36:13.070666 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:36:13.070678 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:36:13.070692 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:36:13.070702 kernel: Movable zone start for each node Feb 9 19:36:13.070713 kernel: Early memory node ranges Feb 9 19:36:13.070723 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:36:13.070734 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 9 19:36:13.070744 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 9 19:36:13.070755 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:36:13.070766 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 9 19:36:13.070778 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:36:13.070792 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:36:13.070804 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 9 19:36:13.070816 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 9 19:36:13.070829 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 9 19:36:13.070841 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:36:13.070854 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:36:13.070868 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:36:13.070880 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 9 19:36:13.070891 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:36:13.070903 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 9 19:36:13.070914 kernel: Booting paravirtualized kernel on Hyper-V Feb 9 19:36:13.070925 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:36:13.070936 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:36:13.070947 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:36:13.070960 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:36:13.070973 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:36:13.070984 kernel: Hyper-V: PV spinlocks enabled Feb 9 19:36:13.070996 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:36:13.071009 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 9 19:36:13.071019 kernel: Policy zone: Normal Feb 9 19:36:13.071032 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:36:13.071044 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:36:13.071056 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:36:13.071068 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:36:13.071079 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:36:13.071092 kernel: Memory: 8081144K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306056K reserved, 0K cma-reserved) Feb 9 19:36:13.071107 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:36:13.071119 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:36:13.071141 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:36:13.071155 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:36:13.071167 kernel: rcu: RCU event tracing is enabled. Feb 9 19:36:13.071179 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:36:13.071192 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:36:13.071206 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:36:13.071220 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:36:13.071234 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:36:13.071247 kernel: Using NULL legacy PIC Feb 9 19:36:13.071264 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 9 19:36:13.071278 kernel: Console: colour dummy device 80x25 Feb 9 19:36:13.071291 kernel: printk: console [tty1] enabled Feb 9 19:36:13.071305 kernel: printk: console [ttyS0] enabled Feb 9 19:36:13.071318 kernel: printk: bootconsole [earlyser0] disabled Feb 9 19:36:13.071334 kernel: ACPI: Core revision 20210730 Feb 9 19:36:13.071347 kernel: Failed to register legacy timer interrupt Feb 9 19:36:13.071360 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:36:13.071373 kernel: Hyper-V: Using IPI hypercalls Feb 9 19:36:13.071386 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Feb 9 19:36:13.071399 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:36:13.071412 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:36:13.071436 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:36:13.071448 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:36:13.071461 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:36:13.071478 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:36:13.071491 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 19:36:13.071504 kernel: RETBleed: Vulnerable Feb 9 19:36:13.071517 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:36:13.071529 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:36:13.071543 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:36:13.071555 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:36:13.071568 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:36:13.071581 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:36:13.071595 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:36:13.071610 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 19:36:13.071623 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 19:36:13.071636 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 19:36:13.071649 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:36:13.071662 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 9 19:36:13.071677 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 9 19:36:13.071689 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 9 19:36:13.071702 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 9 19:36:13.071715 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:36:13.071727 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:36:13.071741 kernel: LSM: Security Framework initializing Feb 9 19:36:13.071754 kernel: SELinux: Initializing. Feb 9 19:36:13.071769 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:36:13.071783 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:36:13.071796 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 19:36:13.071809 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 19:36:13.071822 kernel: signal: max sigframe size: 3632 Feb 9 19:36:13.071835 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:36:13.071848 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:36:13.071861 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:36:13.071874 kernel: x86: Booting SMP configuration: Feb 9 19:36:13.071887 kernel: .... node #0, CPUs: #1 Feb 9 19:36:13.071903 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 9 19:36:13.071917 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:36:13.071930 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:36:13.071944 kernel: smpboot: Max logical packages: 1 Feb 9 19:36:13.071956 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 9 19:36:13.071969 kernel: devtmpfs: initialized Feb 9 19:36:13.071983 kernel: x86/mm: Memory block size: 128MB Feb 9 19:36:13.071996 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 9 19:36:13.072012 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:36:13.072025 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:36:13.072038 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:36:13.072050 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:36:13.072064 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:36:13.072077 kernel: audit: type=2000 audit(1707507372.024:1): state=initialized audit_enabled=0 res=1 Feb 9 19:36:13.072090 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:36:13.072103 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:36:13.072117 kernel: cpuidle: using governor menu Feb 9 19:36:13.072133 kernel: ACPI: bus type PCI registered Feb 9 19:36:13.072146 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:36:13.072158 kernel: dca service started, version 1.12.1 Feb 9 19:36:13.072171 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:36:13.072185 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:36:13.072198 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:36:13.072210 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:36:13.072223 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:36:13.072236 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:36:13.072252 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:36:13.072265 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:36:13.072279 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:36:13.072293 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:36:13.072305 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:36:13.072318 kernel: ACPI: Interpreter enabled Feb 9 19:36:13.072331 kernel: ACPI: PM: (supports S0 S5) Feb 9 19:36:13.072344 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:36:13.072356 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:36:13.072372 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 9 19:36:13.072385 kernel: iommu: Default domain type: Translated Feb 9 19:36:13.072397 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:36:13.072411 kernel: vgaarb: loaded Feb 9 19:36:13.072441 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:36:13.072454 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:36:13.072467 kernel: PTP clock support registered Feb 9 19:36:13.072479 kernel: Registered efivars operations Feb 9 19:36:13.072493 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:36:13.072505 kernel: PCI: System does not support PCI Feb 9 19:36:13.072521 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 9 19:36:13.072535 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:36:13.072548 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:36:13.072561 kernel: pnp: PnP ACPI init Feb 9 19:36:13.072573 kernel: pnp: PnP ACPI: found 3 devices Feb 9 19:36:13.072587 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:36:13.072600 kernel: NET: Registered PF_INET protocol family Feb 9 19:36:13.072614 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:36:13.072630 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:36:13.072642 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:36:13.072656 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:36:13.072669 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:36:13.072682 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:36:13.072695 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:36:13.072708 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:36:13.072721 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:36:13.072733 kernel: NET: Registered PF_XDP protocol family Feb 9 19:36:13.072749 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:36:13.072761 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:36:13.072775 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 9 19:36:13.072789 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:36:13.072802 kernel: Initialise system trusted keyrings Feb 9 19:36:13.072816 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:36:13.072828 kernel: Key type asymmetric registered Feb 9 19:36:13.072839 kernel: Asymmetric key parser 'x509' registered Feb 9 19:36:13.072851 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:36:13.072865 kernel: io scheduler mq-deadline registered Feb 9 19:36:13.072877 kernel: io scheduler kyber registered Feb 9 19:36:13.072890 kernel: io scheduler bfq registered Feb 9 19:36:13.072901 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:36:13.072914 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:36:13.072926 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:36:13.072939 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:36:13.072951 kernel: i8042: PNP: No PS/2 controller found. Feb 9 19:36:13.073115 kernel: rtc_cmos 00:02: registered as rtc0 Feb 9 19:36:13.073227 kernel: rtc_cmos 00:02: setting system clock to 2024-02-09T19:36:12 UTC (1707507372) Feb 9 19:36:13.073326 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 9 19:36:13.073343 kernel: fail to initialize ptp_kvm Feb 9 19:36:13.073358 kernel: intel_pstate: CPU model not supported Feb 9 19:36:13.073372 kernel: efifb: probing for efifb Feb 9 19:36:13.073386 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 19:36:13.073399 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 19:36:13.090486 kernel: efifb: scrolling: redraw Feb 9 19:36:13.090524 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:36:13.090541 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:36:13.090555 kernel: fb0: EFI VGA frame buffer device Feb 9 19:36:13.090570 kernel: pstore: Registered efi as persistent store backend Feb 9 19:36:13.090584 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:36:13.090598 kernel: Segment Routing with IPv6 Feb 9 19:36:13.090611 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:36:13.090622 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:36:13.090634 kernel: Key type dns_resolver registered Feb 9 19:36:13.090651 kernel: IPI shorthand broadcast: enabled Feb 9 19:36:13.090663 kernel: sched_clock: Marking stable (834912300, 25559300)->(1073584300, -213112700) Feb 9 19:36:13.090674 kernel: registered taskstats version 1 Feb 9 19:36:13.090684 kernel: Loading compiled-in X.509 certificates Feb 9 19:36:13.090697 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:36:13.090710 kernel: Key type .fscrypt registered Feb 9 19:36:13.090722 kernel: Key type fscrypt-provisioning registered Feb 9 19:36:13.090735 kernel: pstore: Using crash dump compression: deflate Feb 9 19:36:13.090752 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:36:13.090765 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:36:13.090777 kernel: ima: No architecture policies found Feb 9 19:36:13.090788 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:36:13.090800 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:36:13.090815 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:36:13.090829 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:36:13.090843 kernel: Run /init as init process Feb 9 19:36:13.090856 kernel: with arguments: Feb 9 19:36:13.090869 kernel: /init Feb 9 19:36:13.090884 kernel: with environment: Feb 9 19:36:13.090898 kernel: HOME=/ Feb 9 19:36:13.090910 kernel: TERM=linux Feb 9 19:36:13.090924 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:36:13.090943 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:36:13.090959 systemd[1]: Detected virtualization microsoft. Feb 9 19:36:13.090974 systemd[1]: Detected architecture x86-64. Feb 9 19:36:13.090990 systemd[1]: Running in initrd. Feb 9 19:36:13.091005 systemd[1]: No hostname configured, using default hostname. Feb 9 19:36:13.091019 systemd[1]: Hostname set to . Feb 9 19:36:13.091033 systemd[1]: Initializing machine ID from random generator. Feb 9 19:36:13.091048 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:36:13.091061 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:36:13.091073 systemd[1]: Reached target cryptsetup.target. Feb 9 19:36:13.091087 systemd[1]: Reached target paths.target. Feb 9 19:36:13.091101 systemd[1]: Reached target slices.target. Feb 9 19:36:13.091118 systemd[1]: Reached target swap.target. Feb 9 19:36:13.091132 systemd[1]: Reached target timers.target. Feb 9 19:36:13.091150 systemd[1]: Listening on iscsid.socket. Feb 9 19:36:13.091164 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:36:13.091177 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:36:13.091191 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:36:13.091205 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:36:13.091221 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:36:13.091235 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:36:13.091247 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:36:13.091262 systemd[1]: Reached target sockets.target. Feb 9 19:36:13.091277 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:36:13.091291 systemd[1]: Finished network-cleanup.service. Feb 9 19:36:13.091304 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:36:13.091320 systemd[1]: Starting systemd-journald.service... Feb 9 19:36:13.091334 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:36:13.091355 systemd[1]: Starting systemd-resolved.service... Feb 9 19:36:13.091372 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:36:13.091384 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:36:13.091398 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:36:13.091411 kernel: audit: type=1130 audit(1707507373.073:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.091433 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:36:13.091451 systemd-journald[183]: Journal started Feb 9 19:36:13.091522 systemd-journald[183]: Runtime Journal (/run/log/journal/06f3c50e3ee54449893e8d057959fee9) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:36:13.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.044457 systemd-modules-load[184]: Inserted module 'overlay' Feb 9 19:36:13.117642 systemd[1]: Started systemd-resolved.service. Feb 9 19:36:13.117669 kernel: audit: type=1130 audit(1707507373.093:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.117684 systemd[1]: Started systemd-journald.service. Feb 9 19:36:13.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.086919 systemd-resolved[185]: Positive Trust Anchors: Feb 9 19:36:13.086928 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:36:13.158449 kernel: audit: type=1130 audit(1707507373.113:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.158492 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:36:13.158515 kernel: audit: type=1130 audit(1707507373.121:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.086963 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:36:13.090360 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 9 19:36:13.125036 systemd[1]: Reached target nss-lookup.target. Feb 9 19:36:13.181836 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:36:13.184646 kernel: Bridge firewalling registered Feb 9 19:36:13.184680 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 9 19:36:13.188181 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:36:13.202670 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:36:13.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.217757 kernel: audit: type=1130 audit(1707507373.202:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.221353 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:36:13.240052 kernel: audit: type=1130 audit(1707507373.223:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.224845 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:36:13.248433 kernel: SCSI subsystem initialized Feb 9 19:36:13.251722 dracut-cmdline[200]: dracut-dracut-053 Feb 9 19:36:13.256331 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:36:13.289273 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:36:13.289349 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:36:13.296825 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:36:13.301100 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 9 19:36:13.301885 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:36:13.321708 kernel: audit: type=1130 audit(1707507373.306:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.319518 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:36:13.331794 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:36:13.346104 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:36:13.346148 kernel: audit: type=1130 audit(1707507373.334:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.361437 kernel: iscsi: registered transport (tcp) Feb 9 19:36:13.385107 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:36:13.385182 kernel: QLogic iSCSI HBA Driver Feb 9 19:36:13.414691 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:36:13.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.428859 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:36:13.432460 kernel: audit: type=1130 audit(1707507373.417:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.480444 kernel: raid6: avx512x4 gen() 18581 MB/s Feb 9 19:36:13.500432 kernel: raid6: avx512x4 xor() 7048 MB/s Feb 9 19:36:13.520428 kernel: raid6: avx512x2 gen() 18273 MB/s Feb 9 19:36:13.540430 kernel: raid6: avx512x2 xor() 29525 MB/s Feb 9 19:36:13.560429 kernel: raid6: avx512x1 gen() 18304 MB/s Feb 9 19:36:13.580426 kernel: raid6: avx512x1 xor() 25997 MB/s Feb 9 19:36:13.600428 kernel: raid6: avx2x4 gen() 18370 MB/s Feb 9 19:36:13.621432 kernel: raid6: avx2x4 xor() 6582 MB/s Feb 9 19:36:13.641427 kernel: raid6: avx2x2 gen() 18208 MB/s Feb 9 19:36:13.660429 kernel: raid6: avx2x2 xor() 21665 MB/s Feb 9 19:36:13.680426 kernel: raid6: avx2x1 gen() 13410 MB/s Feb 9 19:36:13.700429 kernel: raid6: avx2x1 xor() 18968 MB/s Feb 9 19:36:13.719437 kernel: raid6: sse2x4 gen() 11667 MB/s Feb 9 19:36:13.740431 kernel: raid6: sse2x4 xor() 5958 MB/s Feb 9 19:36:13.760427 kernel: raid6: sse2x2 gen() 12650 MB/s Feb 9 19:36:13.780426 kernel: raid6: sse2x2 xor() 7512 MB/s Feb 9 19:36:13.800429 kernel: raid6: sse2x1 gen() 11673 MB/s Feb 9 19:36:13.823379 kernel: raid6: sse2x1 xor() 5934 MB/s Feb 9 19:36:13.823406 kernel: raid6: using algorithm avx512x4 gen() 18581 MB/s Feb 9 19:36:13.823433 kernel: raid6: .... xor() 7048 MB/s, rmw enabled Feb 9 19:36:13.826794 kernel: raid6: using avx512x2 recovery algorithm Feb 9 19:36:13.846438 kernel: xor: automatically using best checksumming function avx Feb 9 19:36:13.942444 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:36:13.951020 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:36:13.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.955000 audit: BPF prog-id=7 op=LOAD Feb 9 19:36:13.955000 audit: BPF prog-id=8 op=LOAD Feb 9 19:36:13.956745 systemd[1]: Starting systemd-udevd.service... Feb 9 19:36:13.971756 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 9 19:36:13.978507 systemd[1]: Started systemd-udevd.service. Feb 9 19:36:13.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:13.984785 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:36:13.995355 dracut-pre-trigger[391]: rd.md=0: removing MD RAID activation Feb 9 19:36:14.023753 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:36:14.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:14.029756 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:36:14.069408 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:36:14.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:14.113439 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:36:14.133440 kernel: hv_vmbus: Vmbus version:5.2 Feb 9 19:36:14.151447 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 19:36:14.170804 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 19:36:14.181775 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:36:14.181836 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:36:14.188437 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 19:36:14.199803 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 19:36:14.199864 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 19:36:14.205452 kernel: AES CTR mode by8 optimization enabled Feb 9 19:36:14.211136 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 19:36:14.211192 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 19:36:14.217029 kernel: scsi host0: storvsc_host_t Feb 9 19:36:14.217107 kernel: scsi host1: storvsc_host_t Feb 9 19:36:14.226546 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 19:36:14.233439 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 19:36:14.255156 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 19:36:14.255452 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:36:14.258439 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 19:36:14.277743 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 19:36:14.277966 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 19:36:14.278086 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 19:36:14.286663 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 19:36:14.286900 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 19:36:14.292446 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:36:14.298368 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 19:36:14.360162 kernel: hv_netvsc 000d3ab3-cc40-000d-3ab3-cc40000d3ab3 eth0: VF slot 1 added Feb 9 19:36:14.370436 kernel: hv_vmbus: registering driver hv_pci Feb 9 19:36:14.376433 kernel: hv_pci 159abb5c-f392-4268-adf1-4a5a6f7eab36: PCI VMBus probing: Using version 0x10004 Feb 9 19:36:14.508439 kernel: hv_pci 159abb5c-f392-4268-adf1-4a5a6f7eab36: PCI host bridge to bus f392:00 Feb 9 19:36:14.508724 kernel: pci_bus f392:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 9 19:36:14.517788 kernel: pci_bus f392:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 19:36:14.524504 kernel: pci f392:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 9 19:36:14.533544 kernel: pci f392:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:36:14.552617 kernel: pci f392:00:02.0: enabling Extended Tags Feb 9 19:36:14.575542 kernel: pci f392:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at f392:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 9 19:36:14.575777 kernel: pci_bus f392:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 19:36:14.575878 kernel: pci f392:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:36:14.627584 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:36:14.695435 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (426) Feb 9 19:36:14.701435 kernel: mlx5_core f392:00:02.0: firmware version: 14.30.1350 Feb 9 19:36:14.719113 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:36:14.796237 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:36:14.853278 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:36:14.856085 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:36:14.864761 systemd[1]: Starting disk-uuid.service... Feb 9 19:36:14.882439 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:36:14.890433 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:36:14.900435 kernel: mlx5_core f392:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 19:36:15.097821 kernel: mlx5_core f392:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 9 19:36:15.098096 kernel: mlx5_core f392:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Feb 9 19:36:15.118228 kernel: hv_netvsc 000d3ab3-cc40-000d-3ab3-cc40000d3ab3 eth0: VF registering: eth1 Feb 9 19:36:15.118438 kernel: mlx5_core f392:00:02.0 eth1: joined to eth0 Feb 9 19:36:15.133441 kernel: mlx5_core f392:00:02.0 enP62354s1: renamed from eth1 Feb 9 19:36:15.892438 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:36:15.892846 disk-uuid[542]: The operation has completed successfully. Feb 9 19:36:15.975945 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:36:15.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:15.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:15.976076 systemd[1]: Finished disk-uuid.service. Feb 9 19:36:15.985895 systemd[1]: Starting verity-setup.service... Feb 9 19:36:16.019439 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:36:16.213600 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:36:16.219123 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:36:16.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.221228 systemd[1]: Finished verity-setup.service. Feb 9 19:36:16.306441 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:36:16.306441 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:36:16.308723 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:36:16.309538 systemd[1]: Starting ignition-setup.service... Feb 9 19:36:16.339235 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:36:16.339276 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:36:16.339293 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:36:16.335541 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:36:16.396895 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:36:16.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.402000 audit: BPF prog-id=9 op=LOAD Feb 9 19:36:16.403589 systemd[1]: Starting systemd-networkd.service... Feb 9 19:36:16.426962 systemd-networkd[785]: lo: Link UP Feb 9 19:36:16.426974 systemd-networkd[785]: lo: Gained carrier Feb 9 19:36:16.431040 systemd-networkd[785]: Enumeration completed Feb 9 19:36:16.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.431156 systemd[1]: Started systemd-networkd.service. Feb 9 19:36:16.433888 systemd[1]: Reached target network.target. Feb 9 19:36:16.437193 systemd[1]: Starting iscsiuio.service... Feb 9 19:36:16.440388 systemd-networkd[785]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:36:16.443885 systemd[1]: Started iscsiuio.service. Feb 9 19:36:16.447692 systemd[1]: Starting iscsid.service... Feb 9 19:36:16.453679 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:36:16.467229 iscsid[796]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:36:16.467229 iscsid[796]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:36:16.467229 iscsid[796]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:36:16.467229 iscsid[796]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:36:16.467229 iscsid[796]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:36:16.467229 iscsid[796]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:36:16.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.468784 systemd[1]: Started iscsid.service. Feb 9 19:36:16.473723 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:36:16.518592 kernel: mlx5_core f392:00:02.0 enP62354s1: Link up Feb 9 19:36:16.489098 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:36:16.493811 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:36:16.498879 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:36:16.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:16.504492 systemd[1]: Reached target remote-fs.target. Feb 9 19:36:16.520779 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:36:16.528017 systemd[1]: Finished ignition-setup.service. Feb 9 19:36:16.533778 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:36:16.538229 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:36:16.664441 kernel: hv_netvsc 000d3ab3-cc40-000d-3ab3-cc40000d3ab3 eth0: Data path switched to VF: enP62354s1 Feb 9 19:36:16.665347 systemd-networkd[785]: enP62354s1: Link UP Feb 9 19:36:16.665504 systemd-networkd[785]: eth0: Link UP Feb 9 19:36:16.674087 systemd-networkd[785]: eth0: Gained carrier Feb 9 19:36:16.676158 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:36:16.681010 systemd-networkd[785]: enP62354s1: Gained carrier Feb 9 19:36:16.719547 systemd-networkd[785]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:36:17.838618 systemd-networkd[785]: eth0: Gained IPv6LL Feb 9 19:36:19.215276 ignition[811]: Ignition 2.14.0 Feb 9 19:36:19.215294 ignition[811]: Stage: fetch-offline Feb 9 19:36:19.215402 ignition[811]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:19.215488 ignition[811]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:19.276491 ignition[811]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:19.276684 ignition[811]: parsed url from cmdline: "" Feb 9 19:36:19.276688 ignition[811]: no config URL provided Feb 9 19:36:19.276694 ignition[811]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:36:19.276702 ignition[811]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:36:19.276709 ignition[811]: failed to fetch config: resource requires networking Feb 9 19:36:19.277918 ignition[811]: Ignition finished successfully Feb 9 19:36:19.294182 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:36:19.304042 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 19:36:19.304091 kernel: audit: type=1130 audit(1707507379.298:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.300037 systemd[1]: Starting ignition-fetch.service... Feb 9 19:36:19.308936 ignition[817]: Ignition 2.14.0 Feb 9 19:36:19.308943 ignition[817]: Stage: fetch Feb 9 19:36:19.309058 ignition[817]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:19.309088 ignition[817]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:19.313401 ignition[817]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:19.313572 ignition[817]: parsed url from cmdline: "" Feb 9 19:36:19.313577 ignition[817]: no config URL provided Feb 9 19:36:19.313583 ignition[817]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:36:19.313593 ignition[817]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:36:19.313631 ignition[817]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 19:36:19.465234 ignition[817]: GET result: OK Feb 9 19:36:19.465266 ignition[817]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 19:36:19.634380 ignition[817]: opening config device: "/dev/sr0" Feb 9 19:36:19.634693 ignition[817]: getting drive status for "/dev/sr0" Feb 9 19:36:19.634736 ignition[817]: drive status: OK Feb 9 19:36:19.634792 ignition[817]: mounting config device Feb 9 19:36:19.634806 ignition[817]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure881870951" Feb 9 19:36:19.662448 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 19:36:19.661379 ignition[817]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure881870951" Feb 9 19:36:19.661390 ignition[817]: checking for config drive Feb 9 19:36:19.667677 systemd[1]: tmp-ignition\x2dazure881870951.mount: Deactivated successfully. Feb 9 19:36:19.661978 ignition[817]: reading config Feb 9 19:36:19.662392 ignition[817]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure881870951" Feb 9 19:36:19.662505 ignition[817]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure881870951" Feb 9 19:36:19.662544 ignition[817]: config has been read from custom data Feb 9 19:36:19.662628 ignition[817]: parsing config with SHA512: ba642d1d12bac12a1f2fd358c80c556dacc13a3aea174e4fec536655c21dc510894d9a27dad15d16e3c0772d2888e486dab1d226c96b6749023fe6d294141530 Feb 9 19:36:19.702761 unknown[817]: fetched base config from "system" Feb 9 19:36:19.703454 unknown[817]: fetched base config from "system" Feb 9 19:36:19.704114 ignition[817]: fetch: fetch complete Feb 9 19:36:19.703462 unknown[817]: fetched user config from "azure" Feb 9 19:36:19.704119 ignition[817]: fetch: fetch passed Feb 9 19:36:19.704166 ignition[817]: Ignition finished successfully Feb 9 19:36:19.715101 systemd[1]: Finished ignition-fetch.service. Feb 9 19:36:19.734511 kernel: audit: type=1130 audit(1707507379.716:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.718410 systemd[1]: Starting ignition-kargs.service... Feb 9 19:36:19.745304 ignition[825]: Ignition 2.14.0 Feb 9 19:36:19.745315 ignition[825]: Stage: kargs Feb 9 19:36:19.745507 ignition[825]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:19.745541 ignition[825]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:19.755005 ignition[825]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:19.760074 ignition[825]: kargs: kargs passed Feb 9 19:36:19.761042 systemd[1]: Finished ignition-kargs.service. Feb 9 19:36:19.781348 kernel: audit: type=1130 audit(1707507379.763:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.760125 ignition[825]: Ignition finished successfully Feb 9 19:36:19.764287 systemd[1]: Starting ignition-disks.service... Feb 9 19:36:19.779040 ignition[831]: Ignition 2.14.0 Feb 9 19:36:19.779049 ignition[831]: Stage: disks Feb 9 19:36:19.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.787466 systemd[1]: Finished ignition-disks.service. Feb 9 19:36:19.810711 kernel: audit: type=1130 audit(1707507379.789:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.779183 ignition[831]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:19.789926 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:36:19.779203 ignition[831]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:19.803224 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:36:19.782930 ignition[831]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:19.806884 systemd[1]: Reached target local-fs.target. Feb 9 19:36:19.786634 ignition[831]: disks: disks passed Feb 9 19:36:19.808853 systemd[1]: Reached target sysinit.target. Feb 9 19:36:19.786682 ignition[831]: Ignition finished successfully Feb 9 19:36:19.810707 systemd[1]: Reached target basic.target. Feb 9 19:36:19.813743 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:36:19.857844 systemd-fsck[839]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 9 19:36:19.861978 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:36:19.879239 kernel: audit: type=1130 audit(1707507379.864:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:19.866457 systemd[1]: Mounting sysroot.mount... Feb 9 19:36:19.895436 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:36:19.896160 systemd[1]: Mounted sysroot.mount. Feb 9 19:36:19.899743 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:36:19.924326 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:36:19.930390 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 19:36:19.935173 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:36:19.935224 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:36:19.937220 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:36:19.961804 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:36:19.967478 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:36:19.986035 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (849) Feb 9 19:36:19.986104 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:36:19.986116 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:36:19.986222 initrd-setup-root[854]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:36:19.997689 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:36:20.000893 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:36:20.005220 initrd-setup-root[880]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:36:20.010362 initrd-setup-root[888]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:36:20.016995 initrd-setup-root[896]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:36:20.415078 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:36:20.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.431739 systemd[1]: Starting ignition-mount.service... Feb 9 19:36:20.435311 kernel: audit: type=1130 audit(1707507380.417:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.438612 systemd[1]: Starting sysroot-boot.service... Feb 9 19:36:20.469156 ignition[915]: INFO : Ignition 2.14.0 Feb 9 19:36:20.469156 ignition[915]: INFO : Stage: mount Feb 9 19:36:20.489576 kernel: audit: type=1130 audit(1707507380.471:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.473274 systemd[1]: Finished sysroot-boot.service. Feb 9 19:36:20.491970 ignition[915]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:20.491970 ignition[915]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:20.503820 ignition[915]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:20.509300 ignition[915]: INFO : mount: mount passed Feb 9 19:36:20.511397 ignition[915]: INFO : Ignition finished successfully Feb 9 19:36:20.514200 systemd[1]: Finished ignition-mount.service. Feb 9 19:36:20.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.531440 kernel: audit: type=1130 audit(1707507380.516:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:20.663044 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:36:20.663161 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:36:21.184968 coreos-metadata[848]: Feb 09 19:36:21.184 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:36:21.195834 coreos-metadata[848]: Feb 09 19:36:21.195 INFO Fetch successful Feb 9 19:36:21.230109 coreos-metadata[848]: Feb 09 19:36:21.229 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:36:21.240323 coreos-metadata[848]: Feb 09 19:36:21.240 INFO Fetch successful Feb 9 19:36:21.255449 coreos-metadata[848]: Feb 09 19:36:21.255 INFO wrote hostname ci-3510.3.2-a-e84cdbff2f to /sysroot/etc/hostname Feb 9 19:36:21.260833 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 19:36:21.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:21.266562 systemd[1]: Starting ignition-files.service... Feb 9 19:36:21.278754 kernel: audit: type=1130 audit(1707507381.265:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:21.284618 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:36:21.297441 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (927) Feb 9 19:36:21.305723 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:36:21.305773 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:36:21.305784 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:36:21.313876 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:36:21.327539 ignition[946]: INFO : Ignition 2.14.0 Feb 9 19:36:21.327539 ignition[946]: INFO : Stage: files Feb 9 19:36:21.332212 ignition[946]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:21.332212 ignition[946]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:21.345761 ignition[946]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:21.359077 ignition[946]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:36:21.362744 ignition[946]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:36:21.362744 ignition[946]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:36:21.395260 ignition[946]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:36:21.398945 ignition[946]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:36:21.410739 unknown[946]: wrote ssh authorized keys file for user: core Feb 9 19:36:21.413421 ignition[946]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:36:21.418040 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:36:21.423479 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:36:22.013657 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:36:22.160150 ignition[946]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:36:22.168147 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:36:22.168147 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:36:22.168147 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:36:22.990763 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:36:23.166491 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:36:23.171607 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:36:23.171607 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:36:23.648059 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:36:23.810121 ignition[946]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:36:23.818405 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:36:23.818405 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:36:23.818405 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:36:24.029760 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:36:24.292770 ignition[946]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 19:36:24.301152 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:36:24.301152 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:36:24.301152 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:36:24.423429 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:36:24.634566 ignition[946]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 19:36:24.642481 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:36:24.642481 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:36:24.642481 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:36:24.765533 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:36:25.280461 ignition[946]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:36:25.288005 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:36:26.348548 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:36:26.357878 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:36:26.357878 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:36:26.357878 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:36:26.378083 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (949) Feb 9 19:36:26.378117 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2504698538" Feb 9 19:36:26.378117 ignition[946]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2504698538": device or resource busy Feb 9 19:36:26.378117 ignition[946]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2504698538", trying btrfs: device or resource busy Feb 9 19:36:26.378117 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2504698538" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2504698538" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2504698538" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2504698538" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3454120366" Feb 9 19:36:26.401540 ignition[946]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3454120366": device or resource busy Feb 9 19:36:26.401540 ignition[946]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3454120366", trying btrfs: device or resource busy Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3454120366" Feb 9 19:36:26.401540 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3454120366" Feb 9 19:36:26.380761 systemd[1]: mnt-oem2504698538.mount: Deactivated successfully. Feb 9 19:36:26.461430 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3454120366" Feb 9 19:36:26.461430 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3454120366" Feb 9 19:36:26.461430 ignition[946]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:36:26.461430 ignition[946]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:36:26.449604 systemd[1]: mnt-oem3454120366.mount: Deactivated successfully. Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 19:36:26.499041 ignition[946]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:36:26.547998 ignition[946]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:36:26.581612 ignition[946]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:36:26.581612 ignition[946]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:36:26.581612 ignition[946]: INFO : files: files passed Feb 9 19:36:26.581612 ignition[946]: INFO : Ignition finished successfully Feb 9 19:36:26.596433 systemd[1]: Finished ignition-files.service. Feb 9 19:36:26.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.613433 kernel: audit: type=1130 audit(1707507386.598:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.614720 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:36:26.620789 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:36:26.621917 systemd[1]: Starting ignition-quench.service... Feb 9 19:36:26.636115 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:36:26.636210 systemd[1]: Finished ignition-quench.service. Feb 9 19:36:26.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.653359 initrd-setup-root-after-ignition[971]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:36:26.670426 kernel: audit: type=1130 audit(1707507386.641:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.670457 kernel: audit: type=1131 audit(1707507386.641:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.654279 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:36:26.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.675523 systemd[1]: Reached target ignition-complete.target. Feb 9 19:36:26.688998 kernel: audit: type=1130 audit(1707507386.675:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.693396 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:36:26.707683 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:36:26.707893 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:36:26.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.715697 systemd[1]: Reached target initrd-fs.target. Feb 9 19:36:26.745581 kernel: audit: type=1130 audit(1707507386.715:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.745614 kernel: audit: type=1131 audit(1707507386.715:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.740584 systemd[1]: Reached target initrd.target. Feb 9 19:36:26.745605 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:36:26.746645 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:36:26.761463 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:36:26.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.766376 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:36:26.779729 kernel: audit: type=1130 audit(1707507386.765:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.788217 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:36:26.792352 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:36:26.796748 systemd[1]: Stopped target timers.target. Feb 9 19:36:26.800264 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:36:26.802671 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:36:26.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.806859 systemd[1]: Stopped target initrd.target. Feb 9 19:36:26.822634 kernel: audit: type=1131 audit(1707507386.806:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.822763 systemd[1]: Stopped target basic.target. Feb 9 19:36:26.826509 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:36:26.881242 kernel: audit: type=1131 audit(1707507386.826:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.881286 kernel: audit: type=1131 audit(1707507386.831:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.827511 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:36:26.893753 iscsid[796]: iscsid shutting down. Feb 9 19:36:26.827901 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:36:26.900586 ignition[984]: INFO : Ignition 2.14.0 Feb 9 19:36:26.900586 ignition[984]: INFO : Stage: umount Feb 9 19:36:26.900586 ignition[984]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:36:26.900586 ignition[984]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:36:26.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.828344 systemd[1]: Stopped target remote-fs.target. Feb 9 19:36:26.937488 ignition[984]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:36:26.937488 ignition[984]: INFO : umount: umount passed Feb 9 19:36:26.937488 ignition[984]: INFO : Ignition finished successfully Feb 9 19:36:26.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.828726 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:36:26.829205 systemd[1]: Stopped target sysinit.target. Feb 9 19:36:26.829627 systemd[1]: Stopped target local-fs.target. Feb 9 19:36:26.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.830050 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:36:26.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.830478 systemd[1]: Stopped target swap.target. Feb 9 19:36:26.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.830881 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:36:26.831005 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:36:26.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.831371 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:36:26.845788 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:36:26.845938 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:36:26.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.846319 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:36:26.846452 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:36:26.846702 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:36:26.846814 systemd[1]: Stopped ignition-files.service. Feb 9 19:36:26.847178 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 19:36:26.847288 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 19:36:26.881883 systemd[1]: Stopping ignition-mount.service... Feb 9 19:36:26.893578 systemd[1]: Stopping iscsid.service... Feb 9 19:36:26.899427 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:36:26.904471 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:36:27.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.904745 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:36:26.912976 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:36:26.913116 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:36:26.918198 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:36:27.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.918327 systemd[1]: Stopped iscsid.service. Feb 9 19:36:26.924199 systemd[1]: Stopping iscsiuio.service... Feb 9 19:36:27.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.937474 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:36:26.940821 systemd[1]: Stopped iscsiuio.service. Feb 9 19:36:27.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.948981 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:36:27.054000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:36:26.950807 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:36:27.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.955271 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:36:26.955364 systemd[1]: Stopped ignition-mount.service. Feb 9 19:36:26.959987 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:36:27.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.960035 systemd[1]: Stopped ignition-disks.service. Feb 9 19:36:27.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.962995 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:36:26.963046 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:36:27.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.969865 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:36:26.969918 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:36:26.974029 systemd[1]: Stopped target network.target. Feb 9 19:36:26.978073 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:36:26.980777 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:36:27.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.983455 systemd[1]: Stopped target paths.target. Feb 9 19:36:27.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:26.990617 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:36:26.999479 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:36:27.003823 systemd[1]: Stopped target slices.target. Feb 9 19:36:27.006060 systemd[1]: Stopped target sockets.target. Feb 9 19:36:27.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.011241 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:36:27.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.013311 systemd[1]: Closed iscsid.socket. Feb 9 19:36:27.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.017384 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:36:27.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.019084 systemd[1]: Closed iscsiuio.socket. Feb 9 19:36:27.022776 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:36:27.022836 systemd[1]: Stopped ignition-setup.service. Feb 9 19:36:27.027691 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:36:27.031515 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:36:27.034774 systemd-networkd[785]: eth0: DHCPv6 lease lost Feb 9 19:36:27.150000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:36:27.037097 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:36:27.037671 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:36:27.037792 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:36:27.044424 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:36:27.044525 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:36:27.050969 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:36:27.051063 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:36:27.175641 kernel: hv_netvsc 000d3ab3-cc40-000d-3ab3-cc40000d3ab3 eth0: Data path switched from VF: enP62354s1 Feb 9 19:36:27.054643 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:36:27.054676 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:36:27.059279 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:36:27.059336 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:36:27.064437 systemd[1]: Stopping network-cleanup.service... Feb 9 19:36:27.069401 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:36:27.069570 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:36:27.074261 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:36:27.074318 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:36:27.078087 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:36:27.078130 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:36:27.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:27.080572 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:36:27.084855 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:36:27.084986 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:36:27.092105 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:36:27.092150 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:36:27.097253 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:36:27.097293 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:36:27.101823 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:36:27.101874 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:36:27.103928 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:36:27.103969 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:36:27.255975 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Feb 9 19:36:27.108167 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:36:27.108213 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:36:27.111248 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:36:27.122395 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:36:27.122509 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:36:27.126784 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:36:27.126834 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:36:27.130998 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:36:27.131051 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:36:27.135166 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:36:27.135264 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:36:27.197692 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:36:27.197804 systemd[1]: Stopped network-cleanup.service. Feb 9 19:36:27.202077 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:36:27.207046 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:36:27.222225 systemd[1]: Switching root. Feb 9 19:36:27.263935 systemd-journald[183]: Journal stopped Feb 9 19:36:38.878174 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:36:38.878206 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:36:38.878218 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:36:38.878229 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:36:38.878239 kernel: SELinux: policy capability open_perms=1 Feb 9 19:36:38.878250 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:36:38.878260 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:36:38.878273 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:36:38.878282 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:36:38.878292 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:36:38.878300 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:36:38.878311 systemd[1]: Successfully loaded SELinux policy in 210.295ms. Feb 9 19:36:38.878323 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.384ms. Feb 9 19:36:38.878337 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:36:38.878351 systemd[1]: Detected virtualization microsoft. Feb 9 19:36:38.878362 systemd[1]: Detected architecture x86-64. Feb 9 19:36:38.878375 systemd[1]: Detected first boot. Feb 9 19:36:38.878385 systemd[1]: Hostname set to . Feb 9 19:36:38.878397 systemd[1]: Initializing machine ID from random generator. Feb 9 19:36:38.878409 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:36:38.878433 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:36:38.878443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:36:38.878456 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:36:38.878469 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:36:38.878481 kernel: kauditd_printk_skb: 51 callbacks suppressed Feb 9 19:36:38.878490 kernel: audit: type=1334 audit(1707507398.324:91): prog-id=12 op=LOAD Feb 9 19:36:38.878504 kernel: audit: type=1334 audit(1707507398.324:92): prog-id=3 op=UNLOAD Feb 9 19:36:38.878516 kernel: audit: type=1334 audit(1707507398.333:93): prog-id=13 op=LOAD Feb 9 19:36:38.878525 kernel: audit: type=1334 audit(1707507398.345:94): prog-id=14 op=LOAD Feb 9 19:36:38.878536 kernel: audit: type=1334 audit(1707507398.345:95): prog-id=4 op=UNLOAD Feb 9 19:36:38.878546 kernel: audit: type=1334 audit(1707507398.345:96): prog-id=5 op=UNLOAD Feb 9 19:36:38.878557 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:36:38.878567 kernel: audit: type=1131 audit(1707507398.347:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.878580 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:36:38.878594 kernel: audit: type=1130 audit(1707507398.383:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.878603 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:36:38.878615 kernel: audit: type=1131 audit(1707507398.383:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.878625 kernel: audit: type=1334 audit(1707507398.414:100): prog-id=12 op=UNLOAD Feb 9 19:36:38.878637 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:36:38.878646 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:36:38.878662 systemd[1]: Created slice system-getty.slice. Feb 9 19:36:38.878677 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:36:38.878686 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:36:38.878699 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:36:38.878712 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:36:38.878723 systemd[1]: Created slice user.slice. Feb 9 19:36:38.878734 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:36:38.878746 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:36:38.878758 systemd[1]: Set up automount boot.automount. Feb 9 19:36:38.878771 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:36:38.878783 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:36:38.878796 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:36:38.878805 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:36:38.878818 systemd[1]: Reached target integritysetup.target. Feb 9 19:36:38.878830 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:36:38.878841 systemd[1]: Reached target remote-fs.target. Feb 9 19:36:38.878852 systemd[1]: Reached target slices.target. Feb 9 19:36:38.878866 systemd[1]: Reached target swap.target. Feb 9 19:36:38.878878 systemd[1]: Reached target torcx.target. Feb 9 19:36:38.878888 systemd[1]: Reached target veritysetup.target. Feb 9 19:36:38.878900 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:36:38.878912 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:36:38.878923 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:36:38.878944 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:36:38.878968 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:36:38.878990 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:36:38.879009 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:36:38.879030 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:36:38.879051 systemd[1]: Mounting media.mount... Feb 9 19:36:38.879069 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:36:38.879095 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:36:38.879115 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:36:38.879137 systemd[1]: Mounting tmp.mount... Feb 9 19:36:38.879155 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:36:38.879173 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:36:38.879195 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:36:38.879213 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:36:38.879234 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:36:38.879255 systemd[1]: Starting modprobe@drm.service... Feb 9 19:36:38.879279 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:36:38.879299 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:36:38.879319 systemd[1]: Starting modprobe@loop.service... Feb 9 19:36:38.879339 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:36:38.879357 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:36:38.879376 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:36:38.879396 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:36:38.879424 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:36:38.879442 systemd[1]: Stopped systemd-journald.service. Feb 9 19:36:38.879468 kernel: loop: module loaded Feb 9 19:36:38.879485 systemd[1]: Starting systemd-journald.service... Feb 9 19:36:38.879508 kernel: fuse: init (API version 7.34) Feb 9 19:36:38.879525 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:36:38.879547 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:36:38.879569 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:36:38.879590 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:36:38.879610 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:36:38.879632 systemd[1]: Stopped verity-setup.service. Feb 9 19:36:38.879653 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:36:38.879674 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:36:38.879692 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:36:38.879710 systemd[1]: Mounted media.mount. Feb 9 19:36:38.879735 systemd-journald[1126]: Journal started Feb 9 19:36:38.879814 systemd-journald[1126]: Runtime Journal (/run/log/journal/8ff2612e0afc4a00bac9f70efa21dcef) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:36:29.229000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:36:29.971000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:36:29.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:36:29.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:36:29.982000 audit: BPF prog-id=10 op=LOAD Feb 9 19:36:29.982000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:36:29.982000 audit: BPF prog-id=11 op=LOAD Feb 9 19:36:29.982000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:36:30.994000 audit[1017]: AVC avc: denied { associate } for pid=1017 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:36:30.994000 audit[1017]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1000 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:30.994000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:36:31.002000 audit[1017]: AVC avc: denied { associate } for pid=1017 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:36:31.002000 audit[1017]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a9 a2=1ed a3=0 items=2 ppid=1000 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:31.002000 audit: CWD cwd="/" Feb 9 19:36:31.002000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:31.002000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:31.002000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:36:38.324000 audit: BPF prog-id=12 op=LOAD Feb 9 19:36:38.324000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:36:38.333000 audit: BPF prog-id=13 op=LOAD Feb 9 19:36:38.345000 audit: BPF prog-id=14 op=LOAD Feb 9 19:36:38.345000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:36:38.345000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:36:38.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.414000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:36:38.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.763000 audit: BPF prog-id=15 op=LOAD Feb 9 19:36:38.764000 audit: BPF prog-id=16 op=LOAD Feb 9 19:36:38.764000 audit: BPF prog-id=17 op=LOAD Feb 9 19:36:38.764000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:36:38.764000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:36:38.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.875000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:36:38.875000 audit[1126]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd69450200 a2=4000 a3=7ffd6945029c items=0 ppid=1 pid=1126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:38.875000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:36:30.947987 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:36:38.322601 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:36:30.948725 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:36:38.347221 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:36:30.948746 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:36:30.948787 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:36:30.948798 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:36:30.948843 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:36:30.948859 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:36:30.949098 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:36:30.949141 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:36:30.949155 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:36:30.949615 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:36:30.949660 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:36:30.949683 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:36:30.949700 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:36:30.949720 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:36:30.949736 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:36:37.284403 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:36:37.284709 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:36:37.284837 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:36:37.285001 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:36:37.285050 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:36:37.285104 /usr/lib/systemd/system-generators/torcx-generator[1017]: time="2024-02-09T19:36:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:36:38.887558 systemd[1]: Started systemd-journald.service. Feb 9 19:36:38.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.888588 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:36:38.890880 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:36:38.893157 systemd[1]: Mounted tmp.mount. Feb 9 19:36:38.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.895286 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:36:38.897653 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:36:38.900151 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:36:38.900329 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:36:38.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.902960 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:36:38.903209 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:36:38.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.905936 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:36:38.906159 systemd[1]: Finished modprobe@drm.service. Feb 9 19:36:38.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.908738 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:36:38.908971 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:36:38.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.911935 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:36:38.912166 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:36:38.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.914722 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:36:38.914889 systemd[1]: Finished modprobe@loop.service. Feb 9 19:36:38.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.917548 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:36:38.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.920401 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:36:38.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.923205 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:36:38.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:38.927189 systemd[1]: Reached target network-pre.target. Feb 9 19:36:38.931071 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:36:38.934696 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:36:38.951507 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:36:38.965851 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:36:38.970510 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:36:38.973102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:36:38.974992 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:36:38.977518 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:36:38.979259 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:36:38.984307 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:36:38.990630 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:36:38.993367 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:36:39.002593 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:36:39.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.005305 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:36:39.027598 systemd-journald[1126]: Time spent on flushing to /var/log/journal/8ff2612e0afc4a00bac9f70efa21dcef is 33.090ms for 1195 entries. Feb 9 19:36:39.027598 systemd-journald[1126]: System Journal (/var/log/journal/8ff2612e0afc4a00bac9f70efa21dcef) is 8.0M, max 2.6G, 2.6G free. Feb 9 19:36:39.110389 systemd-journald[1126]: Received client request to flush runtime journal. Feb 9 19:36:39.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.029321 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:36:39.111013 udevadm[1141]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:36:39.037257 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:36:39.069215 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:36:39.111703 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:36:39.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.600722 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:36:39.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.605346 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:36:39.787169 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:36:39.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.976173 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:36:39.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:39.979000 audit: BPF prog-id=18 op=LOAD Feb 9 19:36:39.979000 audit: BPF prog-id=19 op=LOAD Feb 9 19:36:39.979000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:36:39.979000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:36:39.980864 systemd[1]: Starting systemd-udevd.service... Feb 9 19:36:39.999463 systemd-udevd[1145]: Using default interface naming scheme 'v252'. Feb 9 19:36:40.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:40.148000 audit: BPF prog-id=20 op=LOAD Feb 9 19:36:40.145026 systemd[1]: Started systemd-udevd.service. Feb 9 19:36:40.150549 systemd[1]: Starting systemd-networkd.service... Feb 9 19:36:40.190532 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:36:40.250482 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:36:40.270439 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 19:36:40.275000 audit: BPF prog-id=21 op=LOAD Feb 9 19:36:40.275000 audit: BPF prog-id=22 op=LOAD Feb 9 19:36:40.275000 audit: BPF prog-id=23 op=LOAD Feb 9 19:36:40.277042 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:36:40.291672 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 19:36:40.291989 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 19:36:40.298483 kernel: Console: switching to colour dummy device 80x25 Feb 9 19:36:40.301438 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:36:40.271000 audit[1155]: AVC avc: denied { confidentiality } for pid=1155 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:36:40.329881 kernel: hv_vmbus: registering driver hv_balloon Feb 9 19:36:40.329974 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 19:36:40.330001 kernel: hv_vmbus: registering driver hv_utils Feb 9 19:36:40.337443 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 19:36:40.271000 audit[1155]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562722450190 a1=f884 a2=7f8a8479ebc5 a3=5 items=12 ppid=1145 pid=1155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:40.271000 audit: CWD cwd="/" Feb 9 19:36:40.271000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=1 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=2 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=3 name=(null) inode=15179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=4 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=5 name=(null) inode=15180 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=6 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=7 name=(null) inode=15181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=8 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=9 name=(null) inode=15182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=10 name=(null) inode=15178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PATH item=11 name=(null) inode=15183 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:40.271000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:36:40.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:40.346039 systemd[1]: Started systemd-userdbd.service. Feb 9 19:36:40.361790 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 19:36:40.361899 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 19:36:40.361929 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 19:36:40.593421 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1162) Feb 9 19:36:40.663772 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:36:40.713449 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 9 19:36:40.744898 systemd-networkd[1156]: lo: Link UP Feb 9 19:36:40.744909 systemd-networkd[1156]: lo: Gained carrier Feb 9 19:36:40.745597 systemd-networkd[1156]: Enumeration completed Feb 9 19:36:40.745742 systemd[1]: Started systemd-networkd.service. Feb 9 19:36:40.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:40.749716 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:36:40.762775 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:36:40.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:40.765315 systemd-networkd[1156]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:36:40.766573 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:36:40.822423 kernel: mlx5_core f392:00:02.0 enP62354s1: Link up Feb 9 19:36:40.869426 kernel: hv_netvsc 000d3ab3-cc40-000d-3ab3-cc40000d3ab3 eth0: Data path switched to VF: enP62354s1 Feb 9 19:36:40.870728 systemd-networkd[1156]: enP62354s1: Link UP Feb 9 19:36:40.870869 systemd-networkd[1156]: eth0: Link UP Feb 9 19:36:40.870873 systemd-networkd[1156]: eth0: Gained carrier Feb 9 19:36:40.876734 systemd-networkd[1156]: enP62354s1: Gained carrier Feb 9 19:36:40.906571 systemd-networkd[1156]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:36:41.010252 lvm[1223]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:36:41.038573 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:36:41.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:41.041643 systemd[1]: Reached target cryptsetup.target. Feb 9 19:36:41.045148 systemd[1]: Starting lvm2-activation.service... Feb 9 19:36:41.050231 lvm[1224]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:36:41.072616 systemd[1]: Finished lvm2-activation.service. Feb 9 19:36:41.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:41.075492 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:36:41.078306 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:36:41.078349 systemd[1]: Reached target local-fs.target. Feb 9 19:36:41.080724 systemd[1]: Reached target machines.target. Feb 9 19:36:41.084599 systemd[1]: Starting ldconfig.service... Feb 9 19:36:41.086799 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:36:41.086914 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:36:41.088297 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:36:41.091717 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:36:41.095881 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:36:41.098750 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:36:41.098854 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:36:41.100068 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:36:41.265836 systemd-tmpfiles[1229]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:36:41.363812 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1226 (bootctl) Feb 9 19:36:41.365635 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:36:41.427129 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:36:41.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:41.443677 systemd-tmpfiles[1229]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:36:41.468855 systemd-tmpfiles[1229]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:36:42.218709 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:36:42.219474 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:36:42.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:42.259671 systemd-networkd[1156]: eth0: Gained IPv6LL Feb 9 19:36:42.265281 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:36:42.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:42.732420 systemd-fsck[1234]: fsck.fat 4.2 (2021-01-31) Feb 9 19:36:42.732420 systemd-fsck[1234]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:36:42.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:42.734420 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:36:42.739332 systemd[1]: Mounting boot.mount... Feb 9 19:36:42.752453 systemd[1]: Mounted boot.mount. Feb 9 19:36:42.765852 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:36:42.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.100028 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:36:43.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.104073 systemd[1]: Starting audit-rules.service... Feb 9 19:36:43.107686 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:36:43.111770 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:36:43.115000 audit: BPF prog-id=24 op=LOAD Feb 9 19:36:43.118270 systemd[1]: Starting systemd-resolved.service... Feb 9 19:36:43.120000 audit: BPF prog-id=25 op=LOAD Feb 9 19:36:43.122276 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:36:43.125633 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:36:43.170000 audit[1246]: SYSTEM_BOOT pid=1246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.175842 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:36:43.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.189626 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:36:43.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.192309 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:36:43.219676 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:36:43.222173 systemd[1]: Reached target time-set.target. Feb 9 19:36:43.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.245135 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:36:43.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:36:43.275858 systemd-resolved[1244]: Positive Trust Anchors: Feb 9 19:36:43.276297 systemd-resolved[1244]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:36:43.276450 systemd-resolved[1244]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:36:43.338577 systemd-timesyncd[1245]: Contacted time server 85.91.1.164:123 (0.flatcar.pool.ntp.org). Feb 9 19:36:43.338701 systemd-timesyncd[1245]: Initial clock synchronization to Fri 2024-02-09 19:36:43.338894 UTC. Feb 9 19:36:43.404000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:36:43.404000 audit[1261]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffce8ddbf0 a2=420 a3=0 items=0 ppid=1240 pid=1261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:43.405991 augenrules[1261]: No rules Feb 9 19:36:43.404000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:36:43.406952 systemd[1]: Finished audit-rules.service. Feb 9 19:36:43.432189 systemd-resolved[1244]: Using system hostname 'ci-3510.3.2-a-e84cdbff2f'. Feb 9 19:36:43.434073 systemd[1]: Started systemd-resolved.service. Feb 9 19:36:43.436487 systemd[1]: Reached target network.target. Feb 9 19:36:43.438450 systemd[1]: Reached target network-online.target. Feb 9 19:36:43.440764 systemd[1]: Reached target nss-lookup.target. Feb 9 19:36:48.106499 ldconfig[1225]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:36:48.117969 systemd[1]: Finished ldconfig.service. Feb 9 19:36:48.121774 systemd[1]: Starting systemd-update-done.service... Feb 9 19:36:48.130337 systemd[1]: Finished systemd-update-done.service. Feb 9 19:36:48.132999 systemd[1]: Reached target sysinit.target. Feb 9 19:36:48.135572 systemd[1]: Started motdgen.path. Feb 9 19:36:48.137319 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:36:48.140518 systemd[1]: Started logrotate.timer. Feb 9 19:36:48.142502 systemd[1]: Started mdadm.timer. Feb 9 19:36:48.144241 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:36:48.146374 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:36:48.146454 systemd[1]: Reached target paths.target. Feb 9 19:36:48.148205 systemd[1]: Reached target timers.target. Feb 9 19:36:48.154444 systemd[1]: Listening on dbus.socket. Feb 9 19:36:48.157693 systemd[1]: Starting docker.socket... Feb 9 19:36:48.173944 systemd[1]: Listening on sshd.socket. Feb 9 19:36:48.175902 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:36:48.176450 systemd[1]: Listening on docker.socket. Feb 9 19:36:48.178202 systemd[1]: Reached target sockets.target. Feb 9 19:36:48.180238 systemd[1]: Reached target basic.target. Feb 9 19:36:48.182423 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:36:48.182459 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:36:48.183650 systemd[1]: Starting containerd.service... Feb 9 19:36:48.187360 systemd[1]: Starting dbus.service... Feb 9 19:36:48.190130 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:36:48.193409 systemd[1]: Starting extend-filesystems.service... Feb 9 19:36:48.195650 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:36:48.197050 systemd[1]: Starting motdgen.service... Feb 9 19:36:48.201036 systemd[1]: Started nvidia.service. Feb 9 19:36:48.204226 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:36:48.207590 systemd[1]: Starting prepare-critools.service... Feb 9 19:36:48.211013 systemd[1]: Starting prepare-helm.service... Feb 9 19:36:48.214624 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:36:48.218065 systemd[1]: Starting sshd-keygen.service... Feb 9 19:36:48.223763 systemd[1]: Starting systemd-logind.service... Feb 9 19:36:48.225765 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:36:48.225866 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:36:48.226533 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:36:48.227617 systemd[1]: Starting update-engine.service... Feb 9 19:36:48.232087 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:36:48.243036 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:36:48.243273 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:36:48.256149 jq[1287]: true Feb 9 19:36:48.256887 jq[1271]: false Feb 9 19:36:48.257686 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:36:48.257943 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:36:48.273084 jq[1296]: true Feb 9 19:36:48.280206 extend-filesystems[1272]: Found sda Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda1 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda2 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda3 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found usr Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda4 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda6 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda7 Feb 9 19:36:48.282588 extend-filesystems[1272]: Found sda9 Feb 9 19:36:48.282588 extend-filesystems[1272]: Checking size of /dev/sda9 Feb 9 19:36:48.329253 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:36:48.329511 systemd[1]: Finished motdgen.service. Feb 9 19:36:48.366796 systemd-logind[1284]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:36:48.367452 systemd-logind[1284]: New seat seat0. Feb 9 19:36:48.395940 extend-filesystems[1272]: Old size kept for /dev/sda9 Feb 9 19:36:48.416569 extend-filesystems[1272]: Found sr0 Feb 9 19:36:48.421118 tar[1290]: ./ Feb 9 19:36:48.421118 tar[1290]: ./loopback Feb 9 19:36:48.397702 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:36:48.425097 tar[1292]: linux-amd64/helm Feb 9 19:36:48.397872 systemd[1]: Finished extend-filesystems.service. Feb 9 19:36:48.429973 tar[1291]: crictl Feb 9 19:36:48.486507 env[1321]: time="2024-02-09T19:36:48.486310441Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:36:48.487367 bash[1315]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:36:48.488895 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:36:48.508130 dbus-daemon[1270]: [system] SELinux support is enabled Feb 9 19:36:48.508320 systemd[1]: Started dbus.service. Feb 9 19:36:48.512972 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:36:48.513010 systemd[1]: Reached target system-config.target. Feb 9 19:36:48.515283 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:36:48.515308 systemd[1]: Reached target user-config.target. Feb 9 19:36:48.520871 systemd[1]: Started systemd-logind.service. Feb 9 19:36:48.522290 dbus-daemon[1270]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:36:48.555113 tar[1290]: ./bandwidth Feb 9 19:36:48.643073 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:36:48.653519 env[1321]: time="2024-02-09T19:36:48.653434055Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:36:48.653677 env[1321]: time="2024-02-09T19:36:48.653651360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660013 env[1321]: time="2024-02-09T19:36:48.659964485Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660013 env[1321]: time="2024-02-09T19:36:48.660011586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660350 env[1321]: time="2024-02-09T19:36:48.660315392Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660431 env[1321]: time="2024-02-09T19:36:48.660353292Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660431 env[1321]: time="2024-02-09T19:36:48.660372693Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:36:48.660431 env[1321]: time="2024-02-09T19:36:48.660388893Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660547 env[1321]: time="2024-02-09T19:36:48.660526496Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.660841 env[1321]: time="2024-02-09T19:36:48.660816102Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:36:48.661036 env[1321]: time="2024-02-09T19:36:48.661007705Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:36:48.661091 env[1321]: time="2024-02-09T19:36:48.661041306Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:36:48.661138 env[1321]: time="2024-02-09T19:36:48.661109207Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:36:48.661138 env[1321]: time="2024-02-09T19:36:48.661124008Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685116084Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685170685Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685189785Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685245786Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685269587Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685288887Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685306087Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685325388Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685342988Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685362588Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685383289Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685413989Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685577993Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:36:48.687462 env[1321]: time="2024-02-09T19:36:48.685675195Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686002101Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686041202Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686062602Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686128204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686146404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686165704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686183205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686200005Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686218105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686233106Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686257906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686279607Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686431010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686451610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688060 env[1321]: time="2024-02-09T19:36:48.686471110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688644 env[1321]: time="2024-02-09T19:36:48.686498311Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:36:48.688644 env[1321]: time="2024-02-09T19:36:48.686521711Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:36:48.688644 env[1321]: time="2024-02-09T19:36:48.686539312Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:36:48.688644 env[1321]: time="2024-02-09T19:36:48.686565812Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:36:48.688644 env[1321]: time="2024-02-09T19:36:48.686607213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:36:48.688828 env[1321]: time="2024-02-09T19:36:48.686860318Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:36:48.688828 env[1321]: time="2024-02-09T19:36:48.686939120Z" level=info msg="Connect containerd service" Feb 9 19:36:48.688828 env[1321]: time="2024-02-09T19:36:48.686989921Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.692681734Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.692828937Z" level=info msg="Start subscribing containerd event" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.692897038Z" level=info msg="Start recovering state" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.692996340Z" level=info msg="Start event monitor" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.693022640Z" level=info msg="Start snapshots syncer" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.693058141Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.693070141Z" level=info msg="Start streaming server" Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.693118342Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:36:48.712850 env[1321]: time="2024-02-09T19:36:48.693168043Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:36:48.693325 systemd[1]: Started containerd.service. Feb 9 19:36:48.720443 env[1321]: time="2024-02-09T19:36:48.720139178Z" level=info msg="containerd successfully booted in 0.234704s" Feb 9 19:36:48.737946 tar[1290]: ./ptp Feb 9 19:36:48.900275 tar[1290]: ./vlan Feb 9 19:36:48.995106 tar[1290]: ./host-device Feb 9 19:36:49.092881 tar[1290]: ./tuning Feb 9 19:36:49.101034 update_engine[1286]: I0209 19:36:49.100692 1286 main.cc:92] Flatcar Update Engine starting Feb 9 19:36:49.161605 systemd[1]: Started update-engine.service. Feb 9 19:36:49.164265 update_engine[1286]: I0209 19:36:49.164139 1286 update_check_scheduler.cc:74] Next update check in 7m17s Feb 9 19:36:49.167566 systemd[1]: Started locksmithd.service. Feb 9 19:36:49.184866 tar[1290]: ./vrf Feb 9 19:36:49.264961 tar[1290]: ./sbr Feb 9 19:36:49.351098 tar[1290]: ./tap Feb 9 19:36:49.435895 tar[1290]: ./dhcp Feb 9 19:36:49.528035 tar[1292]: linux-amd64/LICENSE Feb 9 19:36:49.528510 tar[1292]: linux-amd64/README.md Feb 9 19:36:49.540923 systemd[1]: Finished prepare-helm.service. Feb 9 19:36:49.571470 systemd[1]: Finished prepare-critools.service. Feb 9 19:36:49.625663 tar[1290]: ./static Feb 9 19:36:49.658159 tar[1290]: ./firewall Feb 9 19:36:49.707597 tar[1290]: ./macvlan Feb 9 19:36:49.751824 tar[1290]: ./dummy Feb 9 19:36:49.795529 tar[1290]: ./bridge Feb 9 19:36:49.844277 tar[1290]: ./ipvlan Feb 9 19:36:49.889638 tar[1290]: ./portmap Feb 9 19:36:49.931418 tar[1290]: ./host-local Feb 9 19:36:50.026187 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:36:50.315613 sshd_keygen[1295]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:36:50.336673 systemd[1]: Finished sshd-keygen.service. Feb 9 19:36:50.340964 systemd[1]: Starting issuegen.service... Feb 9 19:36:50.344475 systemd[1]: Started waagent.service. Feb 9 19:36:50.352073 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:36:50.352269 systemd[1]: Finished issuegen.service. Feb 9 19:36:50.356205 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:36:50.363246 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:36:50.367266 systemd[1]: Started getty@tty1.service. Feb 9 19:36:50.371179 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:36:50.373956 systemd[1]: Reached target getty.target. Feb 9 19:36:50.376038 systemd[1]: Reached target multi-user.target. Feb 9 19:36:50.379803 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:36:50.389847 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:36:50.390045 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:36:50.393059 systemd[1]: Startup finished in 672ms (firmware) + 19.627s (loader) + 1.009s (kernel) + 16.099s (initrd) + 21.459s (userspace) = 58.868s. Feb 9 19:36:50.641776 login[1402]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:36:50.641995 login[1401]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:36:50.673619 systemd[1]: Created slice user-500.slice. Feb 9 19:36:50.675098 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:36:50.679305 systemd-logind[1284]: New session 1 of user core. Feb 9 19:36:50.684385 systemd-logind[1284]: New session 2 of user core. Feb 9 19:36:50.688539 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:36:50.690295 systemd[1]: Starting user@500.service... Feb 9 19:36:50.703787 (systemd)[1405]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:36:50.859550 systemd[1405]: Queued start job for default target default.target. Feb 9 19:36:50.860574 systemd[1405]: Reached target paths.target. Feb 9 19:36:50.860604 systemd[1405]: Reached target sockets.target. Feb 9 19:36:50.860623 systemd[1405]: Reached target timers.target. Feb 9 19:36:50.860640 systemd[1405]: Reached target basic.target. Feb 9 19:36:50.860764 systemd[1]: Started user@500.service. Feb 9 19:36:50.861944 systemd[1]: Started session-1.scope. Feb 9 19:36:50.862705 systemd[1]: Started session-2.scope. Feb 9 19:36:50.864192 systemd[1405]: Reached target default.target. Feb 9 19:36:50.864262 systemd[1405]: Startup finished in 153ms. Feb 9 19:36:50.889882 locksmithd[1379]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:36:55.438583 waagent[1396]: 2024-02-09T19:36:55.438456Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 19:36:55.443065 waagent[1396]: 2024-02-09T19:36:55.442983Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 19:36:55.445762 waagent[1396]: 2024-02-09T19:36:55.445693Z INFO Daemon Daemon Python: 3.9.16 Feb 9 19:36:55.448502 waagent[1396]: 2024-02-09T19:36:55.448424Z INFO Daemon Daemon Run daemon Feb 9 19:36:55.451187 waagent[1396]: 2024-02-09T19:36:55.451118Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 19:36:55.464566 waagent[1396]: 2024-02-09T19:36:55.464434Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:36:55.471872 waagent[1396]: 2024-02-09T19:36:55.471749Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.473068Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.473851Z INFO Daemon Daemon Using waagent for provisioning Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.475331Z INFO Daemon Daemon Activate resource disk Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.476080Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.483835Z INFO Daemon Daemon Found device: None Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.485199Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.486093Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.487855Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.488868Z INFO Daemon Daemon Running default provisioning handler Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.499103Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.501908Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.503041Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:36:55.516507 waagent[1396]: 2024-02-09T19:36:55.503887Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 19:36:55.527527 waagent[1396]: 2024-02-09T19:36:55.523469Z INFO Daemon Daemon Successfully mounted dvd Feb 9 19:36:55.613767 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 19:36:55.629346 waagent[1396]: 2024-02-09T19:36:55.629206Z INFO Daemon Daemon Detect protocol endpoint Feb 9 19:36:55.632481 waagent[1396]: 2024-02-09T19:36:55.632387Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:36:55.636179 waagent[1396]: 2024-02-09T19:36:55.636104Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 19:36:55.640112 waagent[1396]: 2024-02-09T19:36:55.640049Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 19:36:55.642966 waagent[1396]: 2024-02-09T19:36:55.642898Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 19:36:55.645654 waagent[1396]: 2024-02-09T19:36:55.645592Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 19:36:55.724909 waagent[1396]: 2024-02-09T19:36:55.724755Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 19:36:55.729584 waagent[1396]: 2024-02-09T19:36:55.729535Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 19:36:55.732880 waagent[1396]: 2024-02-09T19:36:55.732818Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 19:36:56.052987 waagent[1396]: 2024-02-09T19:36:56.052763Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 19:36:56.063808 waagent[1396]: 2024-02-09T19:36:56.063729Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 19:36:56.069142 waagent[1396]: 2024-02-09T19:36:56.065101Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 19:36:56.143430 waagent[1396]: 2024-02-09T19:36:56.143284Z INFO Daemon Daemon Found private key matching thumbprint FC9766D656B922A019F024F1C38E7EA0D9904C92 Feb 9 19:36:56.155237 waagent[1396]: 2024-02-09T19:36:56.145034Z INFO Daemon Daemon Certificate with thumbprint 1BCF02D96DB45F53111815FF299128C4660DA5BB has no matching private key. Feb 9 19:36:56.155237 waagent[1396]: 2024-02-09T19:36:56.146145Z INFO Daemon Daemon Fetch goal state completed Feb 9 19:36:56.170505 waagent[1396]: 2024-02-09T19:36:56.170431Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 1cfccc1c-b8b6-4a77-aeec-81d1dd948ddf New eTag: 5943632887210237370] Feb 9 19:36:56.178313 waagent[1396]: 2024-02-09T19:36:56.172733Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:36:56.182158 waagent[1396]: 2024-02-09T19:36:56.182097Z INFO Daemon Daemon Starting provisioning Feb 9 19:36:56.188917 waagent[1396]: 2024-02-09T19:36:56.183292Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 19:36:56.188917 waagent[1396]: 2024-02-09T19:36:56.184158Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-e84cdbff2f] Feb 9 19:36:56.199969 waagent[1396]: 2024-02-09T19:36:56.199835Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-e84cdbff2f] Feb 9 19:36:56.211313 waagent[1396]: 2024-02-09T19:36:56.205016Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 19:36:56.211313 waagent[1396]: 2024-02-09T19:36:56.206378Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 19:36:56.220300 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 19:36:56.220592 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 19:36:56.220676 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 19:36:56.221041 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:36:56.226453 systemd-networkd[1156]: eth0: DHCPv6 lease lost Feb 9 19:36:56.228164 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:36:56.228387 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:36:56.231116 systemd[1]: Starting systemd-networkd.service... Feb 9 19:36:56.262634 systemd-networkd[1446]: enP62354s1: Link UP Feb 9 19:36:56.262644 systemd-networkd[1446]: enP62354s1: Gained carrier Feb 9 19:36:56.264010 systemd-networkd[1446]: eth0: Link UP Feb 9 19:36:56.264018 systemd-networkd[1446]: eth0: Gained carrier Feb 9 19:36:56.264485 systemd-networkd[1446]: lo: Link UP Feb 9 19:36:56.264494 systemd-networkd[1446]: lo: Gained carrier Feb 9 19:36:56.264810 systemd-networkd[1446]: eth0: Gained IPv6LL Feb 9 19:36:56.265089 systemd-networkd[1446]: Enumeration completed Feb 9 19:36:56.265211 systemd[1]: Started systemd-networkd.service. Feb 9 19:36:56.267503 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:36:56.270376 systemd-networkd[1446]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:36:56.273116 waagent[1396]: 2024-02-09T19:36:56.272942Z INFO Daemon Daemon Create user account if not exists Feb 9 19:36:56.276682 waagent[1396]: 2024-02-09T19:36:56.276589Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 19:36:56.279622 waagent[1396]: 2024-02-09T19:36:56.279549Z INFO Daemon Daemon Configure sudoer Feb 9 19:36:56.282382 waagent[1396]: 2024-02-09T19:36:56.282316Z INFO Daemon Daemon Configure sshd Feb 9 19:36:56.287206 waagent[1396]: 2024-02-09T19:36:56.284666Z INFO Daemon Daemon Deploy ssh public key. Feb 9 19:36:56.305483 systemd-networkd[1446]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:36:56.309072 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:36:56.330178 waagent[1396]: 2024-02-09T19:36:56.330043Z INFO Daemon Daemon Decode custom data Feb 9 19:36:56.338797 waagent[1396]: 2024-02-09T19:36:56.331878Z INFO Daemon Daemon Save custom data Feb 9 19:36:57.605901 waagent[1396]: 2024-02-09T19:36:57.605764Z INFO Daemon Daemon Provisioning complete Feb 9 19:36:57.621307 waagent[1396]: 2024-02-09T19:36:57.621221Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 19:36:57.624577 waagent[1396]: 2024-02-09T19:36:57.624502Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 19:36:57.630045 waagent[1396]: 2024-02-09T19:36:57.629970Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 19:36:57.902641 waagent[1458]: 2024-02-09T19:36:57.902443Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 19:36:57.903373 waagent[1458]: 2024-02-09T19:36:57.903307Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:36:57.903543 waagent[1458]: 2024-02-09T19:36:57.903484Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:36:57.915010 waagent[1458]: 2024-02-09T19:36:57.914920Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 19:36:57.915200 waagent[1458]: 2024-02-09T19:36:57.915142Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 19:36:57.979634 waagent[1458]: 2024-02-09T19:36:57.979499Z INFO ExtHandler ExtHandler Found private key matching thumbprint FC9766D656B922A019F024F1C38E7EA0D9904C92 Feb 9 19:36:57.979885 waagent[1458]: 2024-02-09T19:36:57.979821Z INFO ExtHandler ExtHandler Certificate with thumbprint 1BCF02D96DB45F53111815FF299128C4660DA5BB has no matching private key. Feb 9 19:36:57.980129 waagent[1458]: 2024-02-09T19:36:57.980078Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 19:36:57.994061 waagent[1458]: 2024-02-09T19:36:57.993993Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: bc8563f3-5293-4187-999f-f5aa76208785 New eTag: 5943632887210237370] Feb 9 19:36:57.994673 waagent[1458]: 2024-02-09T19:36:57.994613Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:36:58.053560 waagent[1458]: 2024-02-09T19:36:58.053388Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:36:58.073211 waagent[1458]: 2024-02-09T19:36:58.073108Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1458 Feb 9 19:36:58.076753 waagent[1458]: 2024-02-09T19:36:58.076681Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:36:58.078039 waagent[1458]: 2024-02-09T19:36:58.077978Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:36:58.186123 waagent[1458]: 2024-02-09T19:36:58.185995Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:36:58.186538 waagent[1458]: 2024-02-09T19:36:58.186470Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:36:58.194727 waagent[1458]: 2024-02-09T19:36:58.194669Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:36:58.195212 waagent[1458]: 2024-02-09T19:36:58.195151Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:36:58.196349 waagent[1458]: 2024-02-09T19:36:58.196279Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 19:36:58.197653 waagent[1458]: 2024-02-09T19:36:58.197593Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:36:58.198669 waagent[1458]: 2024-02-09T19:36:58.198610Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:36:58.198849 waagent[1458]: 2024-02-09T19:36:58.198795Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:36:58.199001 waagent[1458]: 2024-02-09T19:36:58.198950Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:36:58.199243 waagent[1458]: 2024-02-09T19:36:58.199194Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:36:58.199948 waagent[1458]: 2024-02-09T19:36:58.199887Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:36:58.200593 waagent[1458]: 2024-02-09T19:36:58.200535Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:36:58.200723 waagent[1458]: 2024-02-09T19:36:58.200656Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:36:58.201136 waagent[1458]: 2024-02-09T19:36:58.201083Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:36:58.201674 waagent[1458]: 2024-02-09T19:36:58.201620Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:36:58.202134 waagent[1458]: 2024-02-09T19:36:58.202082Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:36:58.202349 waagent[1458]: 2024-02-09T19:36:58.202292Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:36:58.202349 waagent[1458]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:36:58.202349 waagent[1458]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:36:58.202349 waagent[1458]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:36:58.202349 waagent[1458]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:36:58.202349 waagent[1458]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:36:58.202349 waagent[1458]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:36:58.205266 waagent[1458]: 2024-02-09T19:36:58.205007Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:36:58.205833 waagent[1458]: 2024-02-09T19:36:58.205760Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:36:58.206104 waagent[1458]: 2024-02-09T19:36:58.206039Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:36:58.206333 waagent[1458]: 2024-02-09T19:36:58.206281Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:36:58.217817 waagent[1458]: 2024-02-09T19:36:58.217760Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 19:36:58.218436 waagent[1458]: 2024-02-09T19:36:58.218365Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:36:58.221997 waagent[1458]: 2024-02-09T19:36:58.221878Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 19:36:58.235184 waagent[1458]: 2024-02-09T19:36:58.235114Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1446' Feb 9 19:36:58.263773 waagent[1458]: 2024-02-09T19:36:58.263695Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 19:36:58.304662 waagent[1458]: 2024-02-09T19:36:58.304521Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:36:58.304662 waagent[1458]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:36:58.304662 waagent[1458]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:36:58.304662 waagent[1458]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b3:cc:40 brd ff:ff:ff:ff:ff:ff Feb 9 19:36:58.304662 waagent[1458]: 3: enP62354s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b3:cc:40 brd ff:ff:ff:ff:ff:ff\ altname enP62354p0s2 Feb 9 19:36:58.304662 waagent[1458]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:36:58.304662 waagent[1458]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:36:58.304662 waagent[1458]: 2: eth0 inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:36:58.304662 waagent[1458]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:36:58.304662 waagent[1458]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:36:58.304662 waagent[1458]: 2: eth0 inet6 fe80::20d:3aff:feb3:cc40/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:36:58.611068 waagent[1458]: 2024-02-09T19:36:58.610988Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 19:36:59.635021 waagent[1396]: 2024-02-09T19:36:59.634828Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 19:36:59.641350 waagent[1396]: 2024-02-09T19:36:59.641283Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 19:37:00.659334 waagent[1496]: 2024-02-09T19:37:00.659209Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 19:37:00.660093 waagent[1496]: 2024-02-09T19:37:00.660022Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 19:37:00.660239 waagent[1496]: 2024-02-09T19:37:00.660184Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 19:37:00.669885 waagent[1496]: 2024-02-09T19:37:00.669776Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:37:00.670291 waagent[1496]: 2024-02-09T19:37:00.670229Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:37:00.670484 waagent[1496]: 2024-02-09T19:37:00.670431Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:37:00.681820 waagent[1496]: 2024-02-09T19:37:00.681741Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 19:37:00.690372 waagent[1496]: 2024-02-09T19:37:00.690301Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 19:37:00.691360 waagent[1496]: 2024-02-09T19:37:00.691296Z INFO ExtHandler Feb 9 19:37:00.691544 waagent[1496]: 2024-02-09T19:37:00.691489Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 02cc30ed-9964-40b1-95dc-dfeb06a4dfda eTag: 5943632887210237370 source: Fabric] Feb 9 19:37:00.692227 waagent[1496]: 2024-02-09T19:37:00.692167Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 19:37:00.693340 waagent[1496]: 2024-02-09T19:37:00.693278Z INFO ExtHandler Feb 9 19:37:00.693533 waagent[1496]: 2024-02-09T19:37:00.693436Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 19:37:00.700426 waagent[1496]: 2024-02-09T19:37:00.700364Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 19:37:00.700882 waagent[1496]: 2024-02-09T19:37:00.700833Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:37:00.720485 waagent[1496]: 2024-02-09T19:37:00.720415Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 19:37:00.786768 waagent[1496]: 2024-02-09T19:37:00.786627Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FC9766D656B922A019F024F1C38E7EA0D9904C92', 'hasPrivateKey': True} Feb 9 19:37:00.787815 waagent[1496]: 2024-02-09T19:37:00.787745Z INFO ExtHandler Downloaded certificate {'thumbprint': '1BCF02D96DB45F53111815FF299128C4660DA5BB', 'hasPrivateKey': False} Feb 9 19:37:00.788797 waagent[1496]: 2024-02-09T19:37:00.788729Z INFO ExtHandler Fetch goal state completed Feb 9 19:37:00.809459 waagent[1496]: 2024-02-09T19:37:00.809364Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1496 Feb 9 19:37:00.812766 waagent[1496]: 2024-02-09T19:37:00.812697Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:37:00.814239 waagent[1496]: 2024-02-09T19:37:00.814179Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:37:00.819408 waagent[1496]: 2024-02-09T19:37:00.819346Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:37:00.819795 waagent[1496]: 2024-02-09T19:37:00.819738Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:37:00.827994 waagent[1496]: 2024-02-09T19:37:00.827936Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:37:00.828500 waagent[1496]: 2024-02-09T19:37:00.828442Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:37:00.834764 waagent[1496]: 2024-02-09T19:37:00.834662Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 19:37:00.839503 waagent[1496]: 2024-02-09T19:37:00.839444Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 19:37:00.840957 waagent[1496]: 2024-02-09T19:37:00.840896Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:37:00.841548 waagent[1496]: 2024-02-09T19:37:00.841491Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:37:00.841710 waagent[1496]: 2024-02-09T19:37:00.841660Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:37:00.842251 waagent[1496]: 2024-02-09T19:37:00.842192Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:37:00.842809 waagent[1496]: 2024-02-09T19:37:00.842752Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:37:00.843186 waagent[1496]: 2024-02-09T19:37:00.843131Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:37:00.843186 waagent[1496]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:37:00.843186 waagent[1496]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:37:00.843186 waagent[1496]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:37:00.843186 waagent[1496]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:37:00.843186 waagent[1496]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:37:00.843186 waagent[1496]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:37:00.843537 waagent[1496]: 2024-02-09T19:37:00.843478Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:37:00.844378 waagent[1496]: 2024-02-09T19:37:00.844320Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:37:00.846442 waagent[1496]: 2024-02-09T19:37:00.846164Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:37:00.847183 waagent[1496]: 2024-02-09T19:37:00.847101Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:37:00.847979 waagent[1496]: 2024-02-09T19:37:00.847905Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:37:00.849089 waagent[1496]: 2024-02-09T19:37:00.849027Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:37:00.850938 waagent[1496]: 2024-02-09T19:37:00.850820Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:37:00.851347 waagent[1496]: 2024-02-09T19:37:00.851280Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:37:00.854865 waagent[1496]: 2024-02-09T19:37:00.854736Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:37:00.860224 waagent[1496]: 2024-02-09T19:37:00.855162Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:37:00.872864 waagent[1496]: 2024-02-09T19:37:00.872799Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:37:00.872864 waagent[1496]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:37:00.872864 waagent[1496]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:37:00.872864 waagent[1496]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b3:cc:40 brd ff:ff:ff:ff:ff:ff Feb 9 19:37:00.872864 waagent[1496]: 3: enP62354s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b3:cc:40 brd ff:ff:ff:ff:ff:ff\ altname enP62354p0s2 Feb 9 19:37:00.872864 waagent[1496]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:37:00.872864 waagent[1496]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:37:00.872864 waagent[1496]: 2: eth0 inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:37:00.872864 waagent[1496]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:37:00.872864 waagent[1496]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:37:00.872864 waagent[1496]: 2: eth0 inet6 fe80::20d:3aff:feb3:cc40/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:37:00.902284 waagent[1496]: 2024-02-09T19:37:00.902202Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 19:37:00.904225 waagent[1496]: 2024-02-09T19:37:00.904160Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 19:37:00.950479 waagent[1496]: 2024-02-09T19:37:00.950352Z INFO ExtHandler ExtHandler Feb 9 19:37:00.951383 waagent[1496]: 2024-02-09T19:37:00.951319Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 55d93ab8-db51-4bca-902f-3c6764ca879a correlation 48d741ec-fe44-40bc-af28-d2a2905d2d29 created: 2024-02-09T19:35:39.294312Z] Feb 9 19:37:00.954889 waagent[1496]: 2024-02-09T19:37:00.954761Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 19:37:00.957576 waagent[1496]: 2024-02-09T19:37:00.957511Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 7 ms] Feb 9 19:37:00.983866 waagent[1496]: 2024-02-09T19:37:00.983788Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 19:37:00.990566 waagent[1496]: 2024-02-09T19:37:00.990429Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 19:37:00.990566 waagent[1496]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:00.990566 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:00.990566 waagent[1496]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:00.990566 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:00.990566 waagent[1496]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:00.990566 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:00.990566 waagent[1496]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:37:00.990566 waagent[1496]: 2 104 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:37:00.990566 waagent[1496]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:37:01.001709 waagent[1496]: 2024-02-09T19:37:01.001570Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A0695801-7BDD-4752-982E-3E3DC671C7C8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 19:37:01.003058 waagent[1496]: 2024-02-09T19:37:01.002985Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 19:37:01.003058 waagent[1496]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:01.003058 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:01.003058 waagent[1496]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:01.003058 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:01.003058 waagent[1496]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:37:01.003058 waagent[1496]: pkts bytes target prot opt in out source destination Feb 9 19:37:01.003058 waagent[1496]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:37:01.003058 waagent[1496]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:37:01.003058 waagent[1496]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:37:01.003591 waagent[1496]: 2024-02-09T19:37:01.003537Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 19:37:28.574013 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 9 19:37:34.863592 update_engine[1286]: I0209 19:37:34.863502 1286 update_attempter.cc:509] Updating boot flags... Feb 9 19:37:46.773185 systemd[1]: Created slice system-sshd.slice. Feb 9 19:37:46.774966 systemd[1]: Started sshd@0-10.200.8.12:22-10.200.12.6:60616.service. Feb 9 19:37:47.543367 sshd[1583]: Accepted publickey for core from 10.200.12.6 port 60616 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:47.545009 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:47.549427 systemd-logind[1284]: New session 3 of user core. Feb 9 19:37:47.550414 systemd[1]: Started session-3.scope. Feb 9 19:37:48.090723 systemd[1]: Started sshd@1-10.200.8.12:22-10.200.12.6:58840.service. Feb 9 19:37:48.707628 sshd[1588]: Accepted publickey for core from 10.200.12.6 port 58840 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:48.709349 sshd[1588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:48.714930 systemd[1]: Started session-4.scope. Feb 9 19:37:48.715375 systemd-logind[1284]: New session 4 of user core. Feb 9 19:37:49.160508 sshd[1588]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:49.163968 systemd[1]: sshd@1-10.200.8.12:22-10.200.12.6:58840.service: Deactivated successfully. Feb 9 19:37:49.165110 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:37:49.165932 systemd-logind[1284]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:37:49.166821 systemd-logind[1284]: Removed session 4. Feb 9 19:37:49.266017 systemd[1]: Started sshd@2-10.200.8.12:22-10.200.12.6:58856.service. Feb 9 19:37:49.885533 sshd[1594]: Accepted publickey for core from 10.200.12.6 port 58856 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:49.887239 sshd[1594]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:49.893143 systemd[1]: Started session-5.scope. Feb 9 19:37:49.893928 systemd-logind[1284]: New session 5 of user core. Feb 9 19:37:50.323825 sshd[1594]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:50.327235 systemd[1]: sshd@2-10.200.8.12:22-10.200.12.6:58856.service: Deactivated successfully. Feb 9 19:37:50.328110 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:37:50.328730 systemd-logind[1284]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:37:50.329492 systemd-logind[1284]: Removed session 5. Feb 9 19:37:50.429170 systemd[1]: Started sshd@3-10.200.8.12:22-10.200.12.6:58868.service. Feb 9 19:37:51.045483 sshd[1600]: Accepted publickey for core from 10.200.12.6 port 58868 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:51.047185 sshd[1600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:51.053034 systemd[1]: Started session-6.scope. Feb 9 19:37:51.053499 systemd-logind[1284]: New session 6 of user core. Feb 9 19:37:51.486218 sshd[1600]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:51.489604 systemd[1]: sshd@3-10.200.8.12:22-10.200.12.6:58868.service: Deactivated successfully. Feb 9 19:37:51.490683 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:37:51.491476 systemd-logind[1284]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:37:51.492429 systemd-logind[1284]: Removed session 6. Feb 9 19:37:51.591286 systemd[1]: Started sshd@4-10.200.8.12:22-10.200.12.6:58872.service. Feb 9 19:37:52.208575 sshd[1606]: Accepted publickey for core from 10.200.12.6 port 58872 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:52.210320 sshd[1606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:52.216096 systemd[1]: Started session-7.scope. Feb 9 19:37:52.216556 systemd-logind[1284]: New session 7 of user core. Feb 9 19:37:52.768296 sudo[1609]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:37:52.768656 sudo[1609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:52.807683 dbus-daemon[1270]: Э\u0015\u000f,V: received setenforce notice (enforcing=-343838672) Feb 9 19:37:52.809978 sudo[1609]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:52.942451 sshd[1606]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:52.945911 systemd[1]: sshd@4-10.200.8.12:22-10.200.12.6:58872.service: Deactivated successfully. Feb 9 19:37:52.946916 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:37:52.947608 systemd-logind[1284]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:37:52.948444 systemd-logind[1284]: Removed session 7. Feb 9 19:37:53.047287 systemd[1]: Started sshd@5-10.200.8.12:22-10.200.12.6:58888.service. Feb 9 19:37:53.663501 sshd[1613]: Accepted publickey for core from 10.200.12.6 port 58888 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:53.665274 sshd[1613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:53.670902 systemd[1]: Started session-8.scope. Feb 9 19:37:53.671516 systemd-logind[1284]: New session 8 of user core. Feb 9 19:37:54.005811 sudo[1617]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:37:54.006122 sudo[1617]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:54.010359 sudo[1617]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:54.015235 sudo[1616]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:37:54.015536 sudo[1616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:54.024773 systemd[1]: Stopping audit-rules.service... Feb 9 19:37:54.025000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:37:54.028565 auditctl[1620]: No rules Feb 9 19:37:54.029491 kernel: kauditd_printk_skb: 84 callbacks suppressed Feb 9 19:37:54.029547 kernel: audit: type=1305 audit(1707507474.025:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:37:54.030654 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:37:54.030822 systemd[1]: Stopped audit-rules.service. Feb 9 19:37:54.032564 systemd[1]: Starting audit-rules.service... Feb 9 19:37:54.025000 audit[1620]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff0d8ed640 a2=420 a3=0 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:54.025000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:37:54.056150 kernel: audit: type=1300 audit(1707507474.025:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff0d8ed640 a2=420 a3=0 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:54.056242 kernel: audit: type=1327 audit(1707507474.025:166): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:37:54.056268 kernel: audit: type=1131 audit(1707507474.030:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.059928 augenrules[1637]: No rules Feb 9 19:37:54.060816 systemd[1]: Finished audit-rules.service. Feb 9 19:37:54.063374 sudo[1616]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:54.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.078479 kernel: audit: type=1130 audit(1707507474.060:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.078559 kernel: audit: type=1106 audit(1707507474.063:169): pid=1616 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.063000 audit[1616]: USER_END pid=1616 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.063000 audit[1616]: CRED_DISP pid=1616 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.103136 kernel: audit: type=1104 audit(1707507474.063:170): pid=1616 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.164249 sshd[1613]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:54.165000 audit[1613]: USER_END pid=1613 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.168403 systemd-logind[1284]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:37:54.169457 systemd[1]: sshd@5-10.200.8.12:22-10.200.12.6:58888.service: Deactivated successfully. Feb 9 19:37:54.170344 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:37:54.171700 systemd-logind[1284]: Removed session 8. Feb 9 19:37:54.165000 audit[1613]: CRED_DISP pid=1613 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.195427 kernel: audit: type=1106 audit(1707507474.165:171): pid=1613 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.195503 kernel: audit: type=1104 audit(1707507474.165:172): pid=1613 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.195540 kernel: audit: type=1131 audit(1707507474.165:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.12.6:58888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.12.6:58888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.270112 systemd[1]: Started sshd@6-10.200.8.12:22-10.200.12.6:58894.service. Feb 9 19:37:54.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:58894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:54.889000 audit[1643]: USER_ACCT pid=1643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.889907 sshd[1643]: Accepted publickey for core from 10.200.12.6 port 58894 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:37:54.890000 audit[1643]: CRED_ACQ pid=1643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.890000 audit[1643]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7c8c5580 a2=3 a3=0 items=0 ppid=1 pid=1643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:54.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:54.891516 sshd[1643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:54.896365 systemd[1]: Started session-9.scope. Feb 9 19:37:54.896991 systemd-logind[1284]: New session 9 of user core. Feb 9 19:37:54.900000 audit[1643]: USER_START pid=1643 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:54.902000 audit[1645]: CRED_ACQ pid=1645 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:37:55.232000 audit[1646]: USER_ACCT pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:55.232000 audit[1646]: CRED_REFR pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:55.232556 sudo[1646]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:37:55.232817 sudo[1646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:55.234000 audit[1646]: USER_START pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:56.052160 systemd[1]: Starting docker.service... Feb 9 19:37:56.100703 env[1661]: time="2024-02-09T19:37:56.100656122Z" level=info msg="Starting up" Feb 9 19:37:56.102370 env[1661]: time="2024-02-09T19:37:56.102345162Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:37:56.102522 env[1661]: time="2024-02-09T19:37:56.102508366Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:37:56.102590 env[1661]: time="2024-02-09T19:37:56.102578168Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:37:56.102634 env[1661]: time="2024-02-09T19:37:56.102626069Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:37:56.107782 env[1661]: time="2024-02-09T19:37:56.107753592Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:37:56.107782 env[1661]: time="2024-02-09T19:37:56.107772193Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:37:56.107932 env[1661]: time="2024-02-09T19:37:56.107790193Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:37:56.107932 env[1661]: time="2024-02-09T19:37:56.107802493Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:37:56.113489 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4027104003-merged.mount: Deactivated successfully. Feb 9 19:37:56.195989 env[1661]: time="2024-02-09T19:37:56.195936106Z" level=info msg="Loading containers: start." Feb 9 19:37:56.242000 audit[1689]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.242000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdb73e2840 a2=0 a3=7ffdb73e282c items=0 ppid=1661 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:37:56.244000 audit[1691]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.244000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff992a8e20 a2=0 a3=7fff992a8e0c items=0 ppid=1661 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:37:56.246000 audit[1693]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.246000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff42cb3f00 a2=0 a3=7fff42cb3eec items=0 ppid=1661 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.246000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:37:56.248000 audit[1695]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.248000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd790457f0 a2=0 a3=7ffd790457dc items=0 ppid=1661 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:37:56.250000 audit[1697]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.250000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd0c03240 a2=0 a3=7fffd0c0322c items=0 ppid=1661 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:37:56.251000 audit[1699]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.251000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc483d30e0 a2=0 a3=7ffc483d30cc items=0 ppid=1661 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.251000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:37:56.267000 audit[1701]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.267000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffaca661d0 a2=0 a3=7fffaca661bc items=0 ppid=1661 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:37:56.269000 audit[1703]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.269000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff355662e0 a2=0 a3=7fff355662cc items=0 ppid=1661 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.269000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:37:56.271000 audit[1705]: NETFILTER_CFG table=filter:16 family=2 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.271000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc260fc670 a2=0 a3=7ffc260fc65c items=0 ppid=1661 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.271000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:56.285000 audit[1709]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_unregister_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.285000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd1c93f360 a2=0 a3=7ffd1c93f34c items=0 ppid=1661 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:56.286000 audit[1710]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.286000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde58cab90 a2=0 a3=7ffde58cab7c items=0 ppid=1661 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:56.332425 kernel: Initializing XFRM netlink socket Feb 9 19:37:56.374056 env[1661]: time="2024-02-09T19:37:56.374005174Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:37:56.434000 audit[1718]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.434000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcef56e300 a2=0 a3=7ffcef56e2ec items=0 ppid=1661 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:37:56.449000 audit[1721]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.449000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcbc184b80 a2=0 a3=7ffcbc184b6c items=0 ppid=1661 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:37:56.452000 audit[1724]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.452000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe2dde7cc0 a2=0 a3=7ffe2dde7cac items=0 ppid=1661 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:37:56.454000 audit[1726]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.454000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc61ec8ab0 a2=0 a3=7ffc61ec8a9c items=0 ppid=1661 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:37:56.456000 audit[1728]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.456000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffff3398f0 a2=0 a3=7fffff3398dc items=0 ppid=1661 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:37:56.458000 audit[1730]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.458000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc102bdde0 a2=0 a3=7ffc102bddcc items=0 ppid=1661 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:37:56.460000 audit[1732]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.460000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdb1f3ff00 a2=0 a3=7ffdb1f3feec items=0 ppid=1661 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.460000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:37:56.462000 audit[1734]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.462000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe448e05c0 a2=0 a3=7ffe448e05ac items=0 ppid=1661 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.462000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:37:56.464000 audit[1736]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.464000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd1784b2d0 a2=0 a3=7ffd1784b2bc items=0 ppid=1661 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.464000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:37:56.466000 audit[1738]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.466000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe88bbf340 a2=0 a3=7ffe88bbf32c items=0 ppid=1661 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.466000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:37:56.468000 audit[1740]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.468000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff79883850 a2=0 a3=7fff7988383c items=0 ppid=1661 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:37:56.469672 systemd-networkd[1446]: docker0: Link UP Feb 9 19:37:56.506000 audit[1744]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_unregister_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.506000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe98938430 a2=0 a3=7ffe9893841c items=0 ppid=1661 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:56.507000 audit[1745]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:56.507000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe073bc9e0 a2=0 a3=7ffe073bc9cc items=0 ppid=1661 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:56.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:56.508070 env[1661]: time="2024-02-09T19:37:56.508020487Z" level=info msg="Loading containers: done." Feb 9 19:37:56.560554 env[1661]: time="2024-02-09T19:37:56.560467244Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:37:56.560818 env[1661]: time="2024-02-09T19:37:56.560766851Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:37:56.560955 env[1661]: time="2024-02-09T19:37:56.560929655Z" level=info msg="Daemon has completed initialization" Feb 9 19:37:56.585938 systemd[1]: Started docker.service. Feb 9 19:37:56.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:56.597492 env[1661]: time="2024-02-09T19:37:56.597422330Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:37:56.615956 systemd[1]: Reloading. Feb 9 19:37:56.698924 /usr/lib/systemd/system-generators/torcx-generator[1792]: time="2024-02-09T19:37:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:37:56.698958 /usr/lib/systemd/system-generators/torcx-generator[1792]: time="2024-02-09T19:37:56Z" level=info msg="torcx already run" Feb 9 19:37:56.794273 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:37:56.794295 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:37:56.812520 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.879000 audit: BPF prog-id=32 op=LOAD Feb 9 19:37:56.879000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit: BPF prog-id=33 op=LOAD Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.881000 audit: BPF prog-id=34 op=LOAD Feb 9 19:37:56.881000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:37:56.881000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit: BPF prog-id=35 op=LOAD Feb 9 19:37:56.883000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.883000 audit: BPF prog-id=36 op=LOAD Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit: BPF prog-id=37 op=LOAD Feb 9 19:37:56.884000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:37:56.884000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.885000 audit: BPF prog-id=38 op=LOAD Feb 9 19:37:56.885000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.886000 audit: BPF prog-id=39 op=LOAD Feb 9 19:37:56.886000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit: BPF prog-id=40 op=LOAD Feb 9 19:37:56.887000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit: BPF prog-id=41 op=LOAD Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.887000 audit: BPF prog-id=42 op=LOAD Feb 9 19:37:56.888000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:37:56.888000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.889000 audit: BPF prog-id=43 op=LOAD Feb 9 19:37:56.889000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit: BPF prog-id=44 op=LOAD Feb 9 19:37:56.891000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit: BPF prog-id=45 op=LOAD Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:56.891000 audit: BPF prog-id=46 op=LOAD Feb 9 19:37:56.891000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:37:56.891000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:37:56.902387 systemd[1]: Started kubelet.service. Feb 9 19:37:56.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:56.977709 kubelet[1854]: E0209 19:37:56.977658 1854 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:37:56.979496 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:37:56.979661 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:37:56.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:37:59.715881 env[1321]: time="2024-02-09T19:37:59.715830025Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 19:38:00.319552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1309675056.mount: Deactivated successfully. Feb 9 19:38:02.420256 env[1321]: time="2024-02-09T19:38:02.420192223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:02.425638 env[1321]: time="2024-02-09T19:38:02.425586933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:02.430096 env[1321]: time="2024-02-09T19:38:02.430055824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:02.434334 env[1321]: time="2024-02-09T19:38:02.434301311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:02.435011 env[1321]: time="2024-02-09T19:38:02.434980425Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 19:38:02.449045 env[1321]: time="2024-02-09T19:38:02.449004611Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 19:38:04.572753 env[1321]: time="2024-02-09T19:38:04.572679388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:04.579738 env[1321]: time="2024-02-09T19:38:04.579689624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:04.584306 env[1321]: time="2024-02-09T19:38:04.584263712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:04.590604 env[1321]: time="2024-02-09T19:38:04.590565534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:04.592190 env[1321]: time="2024-02-09T19:38:04.592150365Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 19:38:04.605784 env[1321]: time="2024-02-09T19:38:04.605741728Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 19:38:06.010197 env[1321]: time="2024-02-09T19:38:06.010135888Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.017521 env[1321]: time="2024-02-09T19:38:06.017473223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.022774 env[1321]: time="2024-02-09T19:38:06.022703219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.029307 env[1321]: time="2024-02-09T19:38:06.029251739Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.029942 env[1321]: time="2024-02-09T19:38:06.029907551Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 19:38:06.040086 env[1321]: time="2024-02-09T19:38:06.040039637Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 19:38:07.067821 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:38:07.083365 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 19:38:07.083521 kernel: audit: type=1130 audit(1707507487.066:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.068121 systemd[1]: Stopped kubelet.service. Feb 9 19:38:07.069912 systemd[1]: Started kubelet.service. Feb 9 19:38:07.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.097417 kernel: audit: type=1131 audit(1707507487.066:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.099580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1020562082.mount: Deactivated successfully. Feb 9 19:38:07.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.117419 kernel: audit: type=1130 audit(1707507487.066:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.171082 kubelet[1887]: E0209 19:38:07.171023 1887 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:38:07.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:38:07.175591 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:38:07.175760 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:38:07.190418 kernel: audit: type=1131 audit(1707507487.174:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:38:07.656823 env[1321]: time="2024-02-09T19:38:07.656759804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:07.661762 env[1321]: time="2024-02-09T19:38:07.661700792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:07.665345 env[1321]: time="2024-02-09T19:38:07.665281856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:07.669062 env[1321]: time="2024-02-09T19:38:07.669013023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:07.669435 env[1321]: time="2024-02-09T19:38:07.669377029Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 19:38:07.679895 env[1321]: time="2024-02-09T19:38:07.679856517Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:38:08.085275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2530726719.mount: Deactivated successfully. Feb 9 19:38:08.103741 env[1321]: time="2024-02-09T19:38:08.103680051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:08.113720 env[1321]: time="2024-02-09T19:38:08.113665625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:08.117457 env[1321]: time="2024-02-09T19:38:08.117410890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:08.122504 env[1321]: time="2024-02-09T19:38:08.122467378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:08.122895 env[1321]: time="2024-02-09T19:38:08.122862685Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:38:08.133183 env[1321]: time="2024-02-09T19:38:08.133141964Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 19:38:08.997031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount810914702.mount: Deactivated successfully. Feb 9 19:38:13.078755 env[1321]: time="2024-02-09T19:38:13.078694135Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:13.090494 env[1321]: time="2024-02-09T19:38:13.090437115Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:13.096298 env[1321]: time="2024-02-09T19:38:13.096241505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:13.102129 env[1321]: time="2024-02-09T19:38:13.102076294Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:13.102817 env[1321]: time="2024-02-09T19:38:13.102783205Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 19:38:13.113319 env[1321]: time="2024-02-09T19:38:13.113283066Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:38:13.713347 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount858046055.mount: Deactivated successfully. Feb 9 19:38:14.378501 env[1321]: time="2024-02-09T19:38:14.378440557Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.385668 env[1321]: time="2024-02-09T19:38:14.385620265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.391340 env[1321]: time="2024-02-09T19:38:14.391303150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.394040 env[1321]: time="2024-02-09T19:38:14.394003391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.394544 env[1321]: time="2024-02-09T19:38:14.394514098Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:38:16.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:16.716301 systemd[1]: Stopped kubelet.service. Feb 9 19:38:16.747029 kernel: audit: type=1130 audit(1707507496.715:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:16.747192 kernel: audit: type=1131 audit(1707507496.717:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:16.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:16.738321 systemd[1]: Reloading. Feb 9 19:38:16.828971 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2024-02-09T19:38:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:38:16.829013 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2024-02-09T19:38:16Z" level=info msg="torcx already run" Feb 9 19:38:16.921661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:38:16.921681 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:38:16.939889 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.020747 kernel: audit: type=1400 audit(1707507497.004:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.034446 kernel: audit: type=1400 audit(1707507497.004:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.034518 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:38:17.052894 kernel: audit: type=1400 audit(1707507497.004:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.053028 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:38:17.053054 kernel: audit: backlog limit exceeded Feb 9 19:38:17.053076 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.079786 kernel: audit: type=1400 audit(1707507497.004:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit: BPF prog-id=47 op=LOAD Feb 9 19:38:17.019000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit: BPF prog-id=48 op=LOAD Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit: BPF prog-id=49 op=LOAD Feb 9 19:38:17.019000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:38:17.019000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit: BPF prog-id=50 op=LOAD Feb 9 19:38:17.033000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit: BPF prog-id=51 op=LOAD Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.033000 audit: BPF prog-id=52 op=LOAD Feb 9 19:38:17.033000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:38:17.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit: BPF prog-id=55 op=LOAD Feb 9 19:38:17.080000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.080000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.082000 audit: BPF prog-id=58 op=LOAD Feb 9 19:38:17.082000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit: BPF prog-id=59 op=LOAD Feb 9 19:38:17.084000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit: BPF prog-id=60 op=LOAD Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.085000 audit: BPF prog-id=61 op=LOAD Feb 9 19:38:17.085000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:38:17.085000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:38:17.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:17.103441 systemd[1]: Started kubelet.service. Feb 9 19:38:17.152842 kubelet[2056]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:17.152842 kubelet[2056]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:17.152842 kubelet[2056]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:17.153355 kubelet[2056]: I0209 19:38:17.152893 2056 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:38:17.646079 kubelet[2056]: I0209 19:38:17.646039 2056 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:38:17.646079 kubelet[2056]: I0209 19:38:17.646070 2056 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:38:17.646388 kubelet[2056]: I0209 19:38:17.646368 2056 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:38:17.651939 kubelet[2056]: E0209 19:38:17.651911 2056 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.12:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.652112 kubelet[2056]: I0209 19:38:17.651969 2056 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:17.653498 kubelet[2056]: I0209 19:38:17.653474 2056 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:38:17.653729 kubelet[2056]: I0209 19:38:17.653714 2056 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:38:17.653819 kubelet[2056]: I0209 19:38:17.653802 2056 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:38:17.653956 kubelet[2056]: I0209 19:38:17.653832 2056 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:38:17.653956 kubelet[2056]: I0209 19:38:17.653850 2056 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:38:17.654044 kubelet[2056]: I0209 19:38:17.653959 2056 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:17.657062 kubelet[2056]: I0209 19:38:17.657042 2056 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:38:17.657062 kubelet[2056]: I0209 19:38:17.657064 2056 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:38:17.657216 kubelet[2056]: I0209 19:38:17.657088 2056 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:38:17.657216 kubelet[2056]: I0209 19:38:17.657101 2056 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:38:17.658560 kubelet[2056]: I0209 19:38:17.658541 2056 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:38:17.658856 kubelet[2056]: W0209 19:38:17.658837 2056 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:38:17.659346 kubelet[2056]: I0209 19:38:17.659325 2056 server.go:1168] "Started kubelet" Feb 9 19:38:17.659505 kubelet[2056]: W0209 19:38:17.659464 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.659570 kubelet[2056]: E0209 19:38:17.659522 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.659636 kubelet[2056]: W0209 19:38:17.659602 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-e84cdbff2f&limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.659686 kubelet[2056]: E0209 19:38:17.659650 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-e84cdbff2f&limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.660591 kubelet[2056]: I0209 19:38:17.660570 2056 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:38:17.661323 kubelet[2056]: I0209 19:38:17.661300 2056 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:38:17.662772 kubelet[2056]: I0209 19:38:17.662750 2056 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:38:17.662000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.662000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:17.662000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c89c50 a1=c0004faf30 a2=c000c89c20 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.662000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:17.662000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.662000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:17.662000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd8c80 a1=c0004faf48 a2=c000c89ce0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.662000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:17.664613 kubelet[2056]: I0209 19:38:17.664037 2056 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:38:17.664613 kubelet[2056]: I0209 19:38:17.664083 2056 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:38:17.664613 kubelet[2056]: I0209 19:38:17.664158 2056 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:38:17.665206 kubelet[2056]: E0209 19:38:17.665107 2056 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-e84cdbff2f.17b24905b94c6fcc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-e84cdbff2f", UID:"ci-3510.3.2-a-e84cdbff2f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-e84cdbff2f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 659297740, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 659297740, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.12:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.12:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:38:17.665586 kubelet[2056]: E0209 19:38:17.665354 2056 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:38:17.665586 kubelet[2056]: E0209 19:38:17.665433 2056 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:38:17.668068 kubelet[2056]: E0209 19:38:17.667601 2056 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-e84cdbff2f\" not found" Feb 9 19:38:17.668068 kubelet[2056]: I0209 19:38:17.667632 2056 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:38:17.668068 kubelet[2056]: I0209 19:38:17.667752 2056 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:38:17.668250 kubelet[2056]: W0209 19:38:17.668210 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.668301 kubelet[2056]: E0209 19:38:17.668267 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.669112 kubelet[2056]: E0209 19:38:17.669072 2056 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": dial tcp 10.200.8.12:6443: connect: connection refused" interval="200ms" Feb 9 19:38:17.670000 audit[2066]: NETFILTER_CFG table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.670000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff60d0a790 a2=0 a3=7fff60d0a77c items=0 ppid=2056 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:38:17.672000 audit[2067]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.672000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdac60fa0 a2=0 a3=7ffcdac60f8c items=0 ppid=2056 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:38:17.694000 audit[2071]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.694000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd74bc440 a2=0 a3=7fffd74bc42c items=0 ppid=2056 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:17.696000 audit[2074]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.696000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffea25fad10 a2=0 a3=7ffea25facfc items=0 ppid=2056 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:17.709820 kubelet[2056]: I0209 19:38:17.709790 2056 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:38:17.709820 kubelet[2056]: I0209 19:38:17.709812 2056 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:38:17.709998 kubelet[2056]: I0209 19:38:17.709832 2056 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:17.714465 kubelet[2056]: I0209 19:38:17.714430 2056 policy_none.go:49] "None policy: Start" Feb 9 19:38:17.715116 kubelet[2056]: I0209 19:38:17.715095 2056 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:38:17.715116 kubelet[2056]: I0209 19:38:17.715119 2056 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:38:17.721612 systemd[1]: Created slice kubepods.slice. Feb 9 19:38:17.725932 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:38:17.730000 audit[2077]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.730000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca9981310 a2=0 a3=7ffca99812fc items=0 ppid=2056 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:38:17.733777 kubelet[2056]: I0209 19:38:17.733756 2056 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:38:17.734000 audit[2079]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:17.734000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0a136cb0 a2=0 a3=7fff0a136c9c items=0 ppid=2056 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.735936 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:38:17.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:38:17.735000 audit[2080]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.735000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce4f21460 a2=0 a3=7ffce4f2144c items=0 ppid=2056 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:38:17.737284 kubelet[2056]: I0209 19:38:17.737271 2056 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:38:17.737357 kubelet[2056]: I0209 19:38:17.737350 2056 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:38:17.737448 kubelet[2056]: I0209 19:38:17.737434 2056 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:38:17.737571 kubelet[2056]: E0209 19:38:17.737559 2056 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:38:17.736000 audit[2081]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.736000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3cc95c40 a2=0 a3=7ffe3cc95c2c items=0 ppid=2056 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:38:17.737000 audit[2082]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:17.737000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef478cd80 a2=0 a3=7ffef478cd6c items=0 ppid=2056 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:38:17.738000 audit[2083]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:17.738000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1a4d36a0 a2=0 a3=7fff1a4d368c items=0 ppid=2056 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:38:17.739000 audit[2084]: NETFILTER_CFG table=nat:42 family=10 entries=2 op=nft_register_chain pid=2084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:17.739000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff2f5aaf20 a2=0 a3=7fff2f5aaf0c items=0 ppid=2056 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:38:17.741864 kubelet[2056]: W0209 19:38:17.741835 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.741938 kubelet[2056]: E0209 19:38:17.741882 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:17.740000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:17.740000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:17.740000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000de6b70 a1=c000fc7458 a2=c000de6b40 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.740000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:17.742573 kubelet[2056]: I0209 19:38:17.742237 2056 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:38:17.742573 kubelet[2056]: I0209 19:38:17.742309 2056 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:38:17.742573 kubelet[2056]: I0209 19:38:17.742550 2056 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:38:17.744164 kubelet[2056]: E0209 19:38:17.744149 2056 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-e84cdbff2f\" not found" Feb 9 19:38:17.743000 audit[2085]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2085 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:17.743000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0be9d300 a2=0 a3=7ffc0be9d2ec items=0 ppid=2056 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:17.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:38:17.769870 kubelet[2056]: I0209 19:38:17.769835 2056 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.770287 kubelet[2056]: E0209 19:38:17.770255 2056 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.12:6443/api/v1/nodes\": dial tcp 10.200.8.12:6443: connect: connection refused" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.838661 kubelet[2056]: I0209 19:38:17.838596 2056 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:17.840627 kubelet[2056]: I0209 19:38:17.840595 2056 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:17.842285 kubelet[2056]: I0209 19:38:17.842266 2056 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:17.848585 systemd[1]: Created slice kubepods-burstable-pod789c638a32dc098313cdc0c24948ec74.slice. Feb 9 19:38:17.863709 systemd[1]: Created slice kubepods-burstable-podb575a29e66502efecabff87d8bf7bd5a.slice. Feb 9 19:38:17.867968 systemd[1]: Created slice kubepods-burstable-pod0d307a41ad66c96df537c6cebb9e60b8.slice. Feb 9 19:38:17.870058 kubelet[2056]: E0209 19:38:17.870032 2056 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": dial tcp 10.200.8.12:6443: connect: connection refused" interval="400ms" Feb 9 19:38:17.970030 kubelet[2056]: I0209 19:38:17.969510 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970030 kubelet[2056]: I0209 19:38:17.969593 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970030 kubelet[2056]: I0209 19:38:17.969633 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970030 kubelet[2056]: I0209 19:38:17.969671 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970030 kubelet[2056]: I0209 19:38:17.969704 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970475 kubelet[2056]: I0209 19:38:17.969740 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970475 kubelet[2056]: I0209 19:38:17.969772 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970475 kubelet[2056]: I0209 19:38:17.969807 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b575a29e66502efecabff87d8bf7bd5a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-e84cdbff2f\" (UID: \"b575a29e66502efecabff87d8bf7bd5a\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.970475 kubelet[2056]: I0209 19:38:17.969841 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.973107 kubelet[2056]: I0209 19:38:17.973083 2056 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:17.973895 kubelet[2056]: E0209 19:38:17.973877 2056 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.12:6443/api/v1/nodes\": dial tcp 10.200.8.12:6443: connect: connection refused" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:18.163958 env[1321]: time="2024-02-09T19:38:18.163895619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-e84cdbff2f,Uid:789c638a32dc098313cdc0c24948ec74,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:18.166609 env[1321]: time="2024-02-09T19:38:18.166556655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-e84cdbff2f,Uid:b575a29e66502efecabff87d8bf7bd5a,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:18.172841 env[1321]: time="2024-02-09T19:38:18.172799440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-e84cdbff2f,Uid:0d307a41ad66c96df537c6cebb9e60b8,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:18.271229 kubelet[2056]: E0209 19:38:18.271085 2056 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": dial tcp 10.200.8.12:6443: connect: connection refused" interval="800ms" Feb 9 19:38:18.376086 kubelet[2056]: I0209 19:38:18.376054 2056 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:18.376449 kubelet[2056]: E0209 19:38:18.376425 2056 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.12:6443/api/v1/nodes\": dial tcp 10.200.8.12:6443: connect: connection refused" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:18.474358 kubelet[2056]: W0209 19:38:18.474296 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-e84cdbff2f&limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.474358 kubelet[2056]: E0209 19:38:18.474358 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-e84cdbff2f&limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.678256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1412633074.mount: Deactivated successfully. Feb 9 19:38:18.700600 env[1321]: time="2024-02-09T19:38:18.700537314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.712847 env[1321]: time="2024-02-09T19:38:18.712797180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.716355 env[1321]: time="2024-02-09T19:38:18.716306028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.720171 env[1321]: time="2024-02-09T19:38:18.719589973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.720311 kubelet[2056]: W0209 19:38:18.720059 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.720311 kubelet[2056]: E0209 19:38:18.720134 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.734486 env[1321]: time="2024-02-09T19:38:18.734427574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.740364 env[1321]: time="2024-02-09T19:38:18.740293054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.744695 env[1321]: time="2024-02-09T19:38:18.744628513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.747911 env[1321]: time="2024-02-09T19:38:18.747870057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.750012 env[1321]: time="2024-02-09T19:38:18.749971186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.754018 env[1321]: time="2024-02-09T19:38:18.753977140Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.756667 env[1321]: time="2024-02-09T19:38:18.756626676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.761207 env[1321]: time="2024-02-09T19:38:18.761158338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:18.823493 env[1321]: time="2024-02-09T19:38:18.817191600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:18.823493 env[1321]: time="2024-02-09T19:38:18.817232100Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:18.823493 env[1321]: time="2024-02-09T19:38:18.817243800Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:18.823493 env[1321]: time="2024-02-09T19:38:18.817378902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69 pid=2094 runtime=io.containerd.runc.v2 Feb 9 19:38:18.837606 env[1321]: time="2024-02-09T19:38:18.837513176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:18.837794 env[1321]: time="2024-02-09T19:38:18.837615977Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:18.837794 env[1321]: time="2024-02-09T19:38:18.837656278Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:18.837910 env[1321]: time="2024-02-09T19:38:18.837831880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8970ff4410a4868e29143a206ca51ad771a4cbfd02aa0be1d87744eed02f57f2 pid=2112 runtime=io.containerd.runc.v2 Feb 9 19:38:18.851519 systemd[1]: Started cri-containerd-7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69.scope. Feb 9 19:38:18.869004 systemd[1]: Started cri-containerd-8970ff4410a4868e29143a206ca51ad771a4cbfd02aa0be1d87744eed02f57f2.scope. Feb 9 19:38:18.873713 env[1321]: time="2024-02-09T19:38:18.872369950Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:18.873879 env[1321]: time="2024-02-09T19:38:18.873730568Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:18.873879 env[1321]: time="2024-02-09T19:38:18.873764269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:18.873991 env[1321]: time="2024-02-09T19:38:18.873931771Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc pid=2152 runtime=io.containerd.runc.v2 Feb 9 19:38:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.880000 audit: BPF prog-id=62 op=LOAD Feb 9 19:38:18.881000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.881000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2094 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383464316133306239643939386530633331316261316237313131 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2094 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383464316133306239643939386530633331316261316237313131 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.882000 audit: BPF prog-id=63 op=LOAD Feb 9 19:38:18.882000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000336170 items=0 ppid=2094 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383464316133306239643939386530633331316261316237313131 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.883000 audit: BPF prog-id=64 op=LOAD Feb 9 19:38:18.883000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003361b8 items=0 ppid=2094 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383464316133306239643939386530633331316261316237313131 Feb 9 19:38:18.884000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:38:18.884000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.884000 audit: BPF prog-id=65 op=LOAD Feb 9 19:38:18.884000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003365c8 items=0 ppid=2094 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383464316133306239643939386530633331316261316237313131 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.898000 audit: BPF prog-id=66 op=LOAD Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2112 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373066663434313061343836386532393134336132303663613531 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2112 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373066663434313061343836386532393134336132303663613531 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit: BPF prog-id=67 op=LOAD Feb 9 19:38:18.899000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c82e0 items=0 ppid=2112 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373066663434313061343836386532393134336132303663613531 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit: BPF prog-id=68 op=LOAD Feb 9 19:38:18.899000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8328 items=0 ppid=2112 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373066663434313061343836386532393134336132303663613531 Feb 9 19:38:18.899000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:38:18.899000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.899000 audit: BPF prog-id=69 op=LOAD Feb 9 19:38:18.899000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8738 items=0 ppid=2112 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373066663434313061343836386532393134336132303663613531 Feb 9 19:38:18.901673 systemd[1]: Started cri-containerd-d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc.scope. Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.925000 audit: BPF prog-id=70 op=LOAD Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2152 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666530386634343935633861623561376330636461643531316139 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2152 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666530386634343935633861623561376330636461643531316139 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit: BPF prog-id=71 op=LOAD Feb 9 19:38:18.926000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a8720 items=0 ppid=2152 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666530386634343935633861623561376330636461643531316139 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.926000 audit: BPF prog-id=72 op=LOAD Feb 9 19:38:18.926000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a8768 items=0 ppid=2152 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666530386634343935633861623561376330636461643531316139 Feb 9 19:38:18.926000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:38:18.927000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:18.927000 audit: BPF prog-id=73 op=LOAD Feb 9 19:38:18.927000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a8b78 items=0 ppid=2152 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:18.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666530386634343935633861623561376330636461643531316139 Feb 9 19:38:18.942298 kubelet[2056]: W0209 19:38:18.942202 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.942298 kubelet[2056]: E0209 19:38:18.942277 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.966958 kubelet[2056]: W0209 19:38:18.966833 2056 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.966958 kubelet[2056]: E0209 19:38:18.966920 2056 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.12:6443: connect: connection refused Feb 9 19:38:18.968747 env[1321]: time="2024-02-09T19:38:18.968558957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-e84cdbff2f,Uid:b575a29e66502efecabff87d8bf7bd5a,Namespace:kube-system,Attempt:0,} returns sandbox id \"7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69\"" Feb 9 19:38:18.973097 env[1321]: time="2024-02-09T19:38:18.973059618Z" level=info msg="CreateContainer within sandbox \"7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:38:18.983558 env[1321]: time="2024-02-09T19:38:18.983511060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-e84cdbff2f,Uid:0d307a41ad66c96df537c6cebb9e60b8,Namespace:kube-system,Attempt:0,} returns sandbox id \"8970ff4410a4868e29143a206ca51ad771a4cbfd02aa0be1d87744eed02f57f2\"" Feb 9 19:38:18.988771 env[1321]: time="2024-02-09T19:38:18.988723331Z" level=info msg="CreateContainer within sandbox \"8970ff4410a4868e29143a206ca51ad771a4cbfd02aa0be1d87744eed02f57f2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:38:18.993904 env[1321]: time="2024-02-09T19:38:18.993858601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-e84cdbff2f,Uid:789c638a32dc098313cdc0c24948ec74,Namespace:kube-system,Attempt:0,} returns sandbox id \"d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc\"" Feb 9 19:38:18.996946 env[1321]: time="2024-02-09T19:38:18.996909343Z" level=info msg="CreateContainer within sandbox \"d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:38:19.028071 env[1321]: time="2024-02-09T19:38:19.028008257Z" level=info msg="CreateContainer within sandbox \"7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335\"" Feb 9 19:38:19.029172 env[1321]: time="2024-02-09T19:38:19.029132272Z" level=info msg="StartContainer for \"063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335\"" Feb 9 19:38:19.045257 env[1321]: time="2024-02-09T19:38:19.045148284Z" level=info msg="CreateContainer within sandbox \"8970ff4410a4868e29143a206ca51ad771a4cbfd02aa0be1d87744eed02f57f2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c4c76b94db0185d05ed51aeb3814973d22c914ad2f0d3144b044a2d7eded95a0\"" Feb 9 19:38:19.046038 env[1321]: time="2024-02-09T19:38:19.045917094Z" level=info msg="StartContainer for \"c4c76b94db0185d05ed51aeb3814973d22c914ad2f0d3144b044a2d7eded95a0\"" Feb 9 19:38:19.049655 systemd[1]: Started cri-containerd-063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335.scope. Feb 9 19:38:19.071873 kubelet[2056]: E0209 19:38:19.071825 2056 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": dial tcp 10.200.8.12:6443: connect: connection refused" interval="1.6s" Feb 9 19:38:19.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.073000 audit: BPF prog-id=74 op=LOAD Feb 9 19:38:19.074000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.074000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036336438646533336466623938353064343562353164643362383562 Feb 9 19:38:19.075000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.075000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036336438646533336466623938353064343562353164643362383562 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.076000 audit: BPF prog-id=75 op=LOAD Feb 9 19:38:19.076000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b7730 items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036336438646533336466623938353064343562353164643362383562 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.077000 audit: BPF prog-id=76 op=LOAD Feb 9 19:38:19.077000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b7778 items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036336438646533336466623938353064343562353164643362383562 Feb 9 19:38:19.078000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:38:19.078000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.078000 audit: BPF prog-id=77 op=LOAD Feb 9 19:38:19.078000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b7b88 items=0 ppid=2094 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036336438646533336466623938353064343562353164643362383562 Feb 9 19:38:19.099380 systemd[1]: Started cri-containerd-c4c76b94db0185d05ed51aeb3814973d22c914ad2f0d3144b044a2d7eded95a0.scope. Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit: BPF prog-id=78 op=LOAD Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2112 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334633736623934646230313835643035656435316165623338313439 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2112 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334633736623934646230313835643035656435316165623338313439 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.119000 audit: BPF prog-id=79 op=LOAD Feb 9 19:38:19.119000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c9630 items=0 ppid=2112 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334633736623934646230313835643035656435316165623338313439 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit: BPF prog-id=80 op=LOAD Feb 9 19:38:19.120000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c9678 items=0 ppid=2112 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334633736623934646230313835643035656435316165623338313439 Feb 9 19:38:19.120000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:38:19.120000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.120000 audit: BPF prog-id=81 op=LOAD Feb 9 19:38:19.120000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9a88 items=0 ppid=2112 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334633736623934646230313835643035656435316165623338313439 Feb 9 19:38:19.129307 env[1321]: time="2024-02-09T19:38:19.129258901Z" level=info msg="CreateContainer within sandbox \"d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed\"" Feb 9 19:38:19.130091 env[1321]: time="2024-02-09T19:38:19.130064011Z" level=info msg="StartContainer for \"8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed\"" Feb 9 19:38:19.144627 env[1321]: time="2024-02-09T19:38:19.144577004Z" level=info msg="StartContainer for \"063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335\" returns successfully" Feb 9 19:38:19.171064 systemd[1]: Started cri-containerd-8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed.scope. Feb 9 19:38:19.180900 kubelet[2056]: I0209 19:38:19.180846 2056 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:19.181438 kubelet[2056]: E0209 19:38:19.181386 2056 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.12:6443/api/v1/nodes\": dial tcp 10.200.8.12:6443: connect: connection refused" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:19.188586 env[1321]: time="2024-02-09T19:38:19.188462486Z" level=info msg="StartContainer for \"c4c76b94db0185d05ed51aeb3814973d22c914ad2f0d3144b044a2d7eded95a0\" returns successfully" Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit: BPF prog-id=82 op=LOAD Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2152 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866333631333664383936613032626163653338633939386230356336 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2152 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866333631333664383936613032626163653338633939386230356336 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit: BPF prog-id=83 op=LOAD Feb 9 19:38:19.230000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c0dd0 items=0 ppid=2152 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866333631333664383936613032626163653338633939386230356336 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.230000 audit: BPF prog-id=84 op=LOAD Feb 9 19:38:19.230000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c0e18 items=0 ppid=2152 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866333631333664383936613032626163653338633939386230356336 Feb 9 19:38:19.231000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:38:19.231000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:19.231000 audit: BPF prog-id=85 op=LOAD Feb 9 19:38:19.231000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c1228 items=0 ppid=2152 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:19.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866333631333664383936613032626163653338633939386230356336 Feb 9 19:38:19.299788 env[1321]: time="2024-02-09T19:38:19.299715063Z" level=info msg="StartContainer for \"8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed\" returns successfully" Feb 9 19:38:20.786327 kubelet[2056]: I0209 19:38:20.786293 2056 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:21.238000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.238000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000825fb0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:21.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:21.239000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.239000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000477e40 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:21.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:21.673000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.673000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0041fa030 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.673000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.673000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0003603c0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.674000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.674000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0041fa180 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.676000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.676000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0041faff0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.691000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.691000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c002dba100 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.691000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.694000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:21.694000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c0042dd5c0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:38:21.694000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:21.888720 kubelet[2056]: I0209 19:38:21.888671 2056 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:21.971697 kubelet[2056]: E0209 19:38:21.971389 2056 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-e84cdbff2f.17b24905b94c6fcc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-e84cdbff2f", UID:"ci-3510.3.2-a-e84cdbff2f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-e84cdbff2f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 659297740, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 659297740, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:22.067469 kubelet[2056]: E0209 19:38:22.067427 2056 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Feb 9 19:38:22.067782 kubelet[2056]: E0209 19:38:22.067667 2056 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-e84cdbff2f.17b24905b9a9de7d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-e84cdbff2f", UID:"ci-3510.3.2-a-e84cdbff2f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-e84cdbff2f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 665420925, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 665420925, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:22.153748 kubelet[2056]: E0209 19:38:22.153603 2056 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-e84cdbff2f.17b24905bc454aaf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-e84cdbff2f", UID:"ci-3510.3.2-a-e84cdbff2f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-e84cdbff2f status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-e84cdbff2f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 709161135, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 17, 709161135, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:22.661161 kubelet[2056]: I0209 19:38:22.661099 2056 apiserver.go:52] "Watching apiserver" Feb 9 19:38:22.668288 kubelet[2056]: I0209 19:38:22.668254 2056 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:38:22.697490 kubelet[2056]: I0209 19:38:22.697450 2056 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:38:22.831209 kubelet[2056]: W0209 19:38:22.831136 2056 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:38:24.207128 systemd[1]: Reloading. Feb 9 19:38:24.310064 /usr/lib/systemd/system-generators/torcx-generator[2345]: time="2024-02-09T19:38:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:38:24.310107 /usr/lib/systemd/system-generators/torcx-generator[2345]: time="2024-02-09T19:38:24Z" level=info msg="torcx already run" Feb 9 19:38:24.403017 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:38:24.403038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:38:24.421677 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:38:24.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.522854 kernel: kauditd_printk_skb: 649 callbacks suppressed Feb 9 19:38:24.523049 kernel: audit: type=1400 audit(1707507504.504:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.536320 kernel: audit: type=1400 audit(1707507504.504:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.536457 kernel: audit: type=1400 audit(1707507504.508:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562857 kernel: audit: type=1400 audit(1707507504.508:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.591221 kernel: audit: type=1400 audit(1707507504.508:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.591418 kernel: audit: type=1400 audit(1707507504.508:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.605452 kernel: audit: type=1400 audit(1707507504.508:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.619829 kernel: audit: type=1400 audit(1707507504.508:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.633426 kernel: audit: type=1400 audit(1707507504.508:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit: BPF prog-id=86 op=LOAD Feb 9 19:38:24.647455 kernel: audit: type=1400 audit(1707507504.548:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit: BPF prog-id=87 op=LOAD Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit: BPF prog-id=88 op=LOAD Feb 9 19:38:24.562000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:38:24.562000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit: BPF prog-id=89 op=LOAD Feb 9 19:38:24.576000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.590000 audit: BPF prog-id=90 op=LOAD Feb 9 19:38:24.590000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit: BPF prog-id=91 op=LOAD Feb 9 19:38:24.632000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.648000 audit: BPF prog-id=95 op=LOAD Feb 9 19:38:24.648000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.649000 audit: BPF prog-id=96 op=LOAD Feb 9 19:38:24.649000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.650000 audit: BPF prog-id=97 op=LOAD Feb 9 19:38:24.650000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.651000 audit: BPF prog-id=98 op=LOAD Feb 9 19:38:24.651000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit: BPF prog-id=99 op=LOAD Feb 9 19:38:24.652000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit: BPF prog-id=100 op=LOAD Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.653000 audit: BPF prog-id=101 op=LOAD Feb 9 19:38:24.653000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:38:24.653000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.654000 audit: BPF prog-id=102 op=LOAD Feb 9 19:38:24.654000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit: BPF prog-id=103 op=LOAD Feb 9 19:38:24.656000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit: BPF prog-id=104 op=LOAD Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.656000 audit: BPF prog-id=105 op=LOAD Feb 9 19:38:24.656000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:38:24.656000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.657000 audit: BPF prog-id=106 op=LOAD Feb 9 19:38:24.657000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:38:24.676017 systemd[1]: Stopping kubelet.service... Feb 9 19:38:24.676606 kubelet[2056]: I0209 19:38:24.676326 2056 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:24.694878 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:38:24.695118 systemd[1]: Stopped kubelet.service. Feb 9 19:38:24.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:24.697803 systemd[1]: Started kubelet.service. Feb 9 19:38:24.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:24.783495 kubelet[2407]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:24.784147 kubelet[2407]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:24.784448 kubelet[2407]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:24.784663 kubelet[2407]: I0209 19:38:24.784617 2407 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:38:24.791013 kubelet[2407]: I0209 19:38:24.790979 2407 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:38:24.791183 kubelet[2407]: I0209 19:38:24.791170 2407 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:38:24.791744 kubelet[2407]: I0209 19:38:24.791723 2407 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:38:24.793987 kubelet[2407]: I0209 19:38:24.793959 2407 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:38:24.795581 kubelet[2407]: I0209 19:38:24.795565 2407 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:24.800587 kubelet[2407]: I0209 19:38:24.800568 2407 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:38:24.800964 kubelet[2407]: I0209 19:38:24.800949 2407 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:38:24.801133 kubelet[2407]: I0209 19:38:24.801119 2407 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:38:24.801310 kubelet[2407]: I0209 19:38:24.801299 2407 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:38:24.801383 kubelet[2407]: I0209 19:38:24.801376 2407 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:38:24.801517 kubelet[2407]: I0209 19:38:24.801507 2407 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:24.813881 kubelet[2407]: I0209 19:38:24.813852 2407 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:38:24.814098 kubelet[2407]: I0209 19:38:24.814086 2407 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:38:24.814198 kubelet[2407]: I0209 19:38:24.814189 2407 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:38:24.814299 kubelet[2407]: I0209 19:38:24.814285 2407 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:38:24.829260 kubelet[2407]: I0209 19:38:24.829236 2407 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:38:24.829979 kubelet[2407]: I0209 19:38:24.829959 2407 server.go:1168] "Started kubelet" Feb 9 19:38:24.838000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.838000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:24.838000 audit[2407]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005734a0 a1=c000737e00 a2=c000573470 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:24.838000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:24.840217 kubelet[2407]: I0209 19:38:24.840200 2407 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:38:24.838000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:24.838000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:24.838000 audit[2407]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000619860 a1=c000737e18 a2=c000573530 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:24.838000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:24.840609 kubelet[2407]: I0209 19:38:24.840591 2407 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:38:24.840704 kubelet[2407]: I0209 19:38:24.840694 2407 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:38:24.859987 kubelet[2407]: I0209 19:38:24.859952 2407 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:38:24.861140 kubelet[2407]: I0209 19:38:24.861115 2407 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:38:24.862791 kubelet[2407]: I0209 19:38:24.862770 2407 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:38:24.865456 kubelet[2407]: I0209 19:38:24.865435 2407 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:38:24.867334 kubelet[2407]: I0209 19:38:24.867314 2407 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:38:24.884450 kubelet[2407]: E0209 19:38:24.884416 2407 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:38:24.884450 kubelet[2407]: E0209 19:38:24.884454 2407 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:38:24.916323 kubelet[2407]: I0209 19:38:24.916290 2407 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:38:24.917820 kubelet[2407]: I0209 19:38:24.917799 2407 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:38:24.917992 kubelet[2407]: I0209 19:38:24.917981 2407 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:38:24.918082 kubelet[2407]: I0209 19:38:24.918073 2407 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:38:24.918200 kubelet[2407]: E0209 19:38:24.918190 2407 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:38:24.974208 kubelet[2407]: I0209 19:38:24.974172 2407 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.018485 kubelet[2407]: E0209 19:38:25.018445 2407 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:38:25.024410 kubelet[2407]: I0209 19:38:25.024369 2407 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.024594 kubelet[2407]: I0209 19:38:25.024469 2407 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.027639 kubelet[2407]: I0209 19:38:25.027617 2407 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:38:25.027819 kubelet[2407]: I0209 19:38:25.027807 2407 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:38:25.027942 kubelet[2407]: I0209 19:38:25.027912 2407 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:25.028320 kubelet[2407]: I0209 19:38:25.028306 2407 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:38:25.028471 kubelet[2407]: I0209 19:38:25.028461 2407 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:38:25.028561 kubelet[2407]: I0209 19:38:25.028552 2407 policy_none.go:49] "None policy: Start" Feb 9 19:38:25.030909 kubelet[2407]: I0209 19:38:25.030882 2407 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:38:25.030909 kubelet[2407]: I0209 19:38:25.030908 2407 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:38:25.031144 kubelet[2407]: I0209 19:38:25.031127 2407 state_mem.go:75] "Updated machine memory state" Feb 9 19:38:25.035584 kubelet[2407]: I0209 19:38:25.035505 2407 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:38:25.035779 kubelet[2407]: I0209 19:38:25.035751 2407 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:38:25.036140 kubelet[2407]: I0209 19:38:25.036126 2407 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:38:25.034000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:25.034000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:25.034000 audit[2407]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007b7740 a1=c000dc7ba8 a2=c0007b7710 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:25.034000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:25.219216 kubelet[2407]: I0209 19:38:25.219167 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:25.219556 kubelet[2407]: I0209 19:38:25.219539 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:25.219718 kubelet[2407]: I0209 19:38:25.219703 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:25.228892 kubelet[2407]: W0209 19:38:25.228862 2407 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:38:25.230546 kubelet[2407]: W0209 19:38:25.230525 2407 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:38:25.232488 kubelet[2407]: W0209 19:38:25.232465 2407 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:38:25.232651 kubelet[2407]: E0209 19:38:25.232638 2407 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270212 kubelet[2407]: I0209 19:38:25.270181 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270477 kubelet[2407]: I0209 19:38:25.270460 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270609 kubelet[2407]: I0209 19:38:25.270595 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270706 kubelet[2407]: I0209 19:38:25.270697 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270828 kubelet[2407]: I0209 19:38:25.270817 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.270923 kubelet[2407]: I0209 19:38:25.270913 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/789c638a32dc098313cdc0c24948ec74-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-e84cdbff2f\" (UID: \"789c638a32dc098313cdc0c24948ec74\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.271011 kubelet[2407]: I0209 19:38:25.271002 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b575a29e66502efecabff87d8bf7bd5a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-e84cdbff2f\" (UID: \"b575a29e66502efecabff87d8bf7bd5a\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.271095 kubelet[2407]: I0209 19:38:25.271087 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.271187 kubelet[2407]: I0209 19:38:25.271177 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0d307a41ad66c96df537c6cebb9e60b8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" (UID: \"0d307a41ad66c96df537c6cebb9e60b8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:25.823314 kubelet[2407]: I0209 19:38:25.823263 2407 apiserver.go:52] "Watching apiserver" Feb 9 19:38:25.868567 kubelet[2407]: I0209 19:38:25.868506 2407 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:38:25.876644 kubelet[2407]: I0209 19:38:25.876604 2407 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:38:25.988225 kubelet[2407]: W0209 19:38:25.988196 2407 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:38:25.988516 kubelet[2407]: E0209 19:38:25.988498 2407 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-e84cdbff2f\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" Feb 9 19:38:26.003756 kubelet[2407]: I0209 19:38:26.003720 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-e84cdbff2f" podStartSLOduration=1.003647642 podCreationTimestamp="2024-02-09 19:38:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:25.995469948 +0000 UTC m=+1.287411046" watchObservedRunningTime="2024-02-09 19:38:26.003647642 +0000 UTC m=+1.295588840" Feb 9 19:38:26.016313 kubelet[2407]: I0209 19:38:26.016279 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" podStartSLOduration=4.016219783 podCreationTimestamp="2024-02-09 19:38:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:26.004064346 +0000 UTC m=+1.296005444" watchObservedRunningTime="2024-02-09 19:38:26.016219783 +0000 UTC m=+1.308160981" Feb 9 19:38:26.016672 kubelet[2407]: I0209 19:38:26.016650 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-e84cdbff2f" podStartSLOduration=1.016616288 podCreationTimestamp="2024-02-09 19:38:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:26.016200883 +0000 UTC m=+1.308141981" watchObservedRunningTime="2024-02-09 19:38:26.016616288 +0000 UTC m=+1.308557486" Feb 9 19:38:30.788017 sudo[1646]: pam_unix(sudo:session): session closed for user root Feb 9 19:38:30.786000 audit[1646]: USER_END pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:30.792135 kernel: kauditd_printk_skb: 296 callbacks suppressed Feb 9 19:38:30.792244 kernel: audit: type=1106 audit(1707507510.786:882): pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:30.791000 audit[1646]: CRED_DISP pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:30.823808 kernel: audit: type=1104 audit(1707507510.791:883): pid=1646 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:30.892368 sshd[1643]: pam_unix(sshd:session): session closed for user core Feb 9 19:38:30.892000 audit[1643]: USER_END pid=1643 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:38:30.896551 systemd[1]: sshd@6-10.200.8.12:22-10.200.12.6:58894.service: Deactivated successfully. Feb 9 19:38:30.897478 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:38:30.897666 systemd[1]: session-9.scope: Consumed 3.894s CPU time. Feb 9 19:38:30.899357 systemd-logind[1284]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:38:30.900704 systemd-logind[1284]: Removed session 9. Feb 9 19:38:30.915016 kernel: audit: type=1106 audit(1707507510.892:884): pid=1643 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:38:30.915137 kernel: audit: type=1104 audit(1707507510.892:885): pid=1643 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:38:30.892000 audit[1643]: CRED_DISP pid=1643 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:38:30.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:58894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:30.950166 kernel: audit: type=1131 audit(1707507510.892:886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.12.6:58894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:34.199000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:38:34.199000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b8a1c0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:34.240475 kernel: audit: type=1400 audit(1707507514.199:887): avc: denied { watch } for pid=2297 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:38:34.240683 kernel: audit: type=1300 audit(1707507514.199:887): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b8a1c0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:34.199000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:34.259614 kernel: audit: type=1327 audit(1707507514.199:887): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.124000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.124000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c250a0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.164314 kernel: audit: type=1400 audit(1707507518.124:888): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.164477 kernel: audit: type=1300 audit(1707507518.124:888): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c250a0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.164512 kernel: audit: type=1327 audit(1707507518.124:888): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.130000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.130000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c251e0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.224008 kernel: audit: type=1400 audit(1707507518.130:889): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.224179 kernel: audit: type=1300 audit(1707507518.130:889): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c251e0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.224211 kernel: audit: type=1327 audit(1707507518.130:889): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.130000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.130000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.257470 kernel: audit: type=1400 audit(1707507518.130:890): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.266544 kernel: audit: type=1300 audit(1707507518.130:890): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c25320 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.130000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c25320 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.130000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.299118 kernel: audit: type=1327 audit(1707507518.130:890): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.299255 kernel: audit: type=1400 audit(1707507518.130:891): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.130000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:38.130000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dea5e0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:38:38.130000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:38.473805 kubelet[2407]: I0209 19:38:38.473688 2407 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:38:38.476009 env[1321]: time="2024-02-09T19:38:38.475957443Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:38:38.476754 kubelet[2407]: I0209 19:38:38.476725 2407 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:38:38.840787 kubelet[2407]: I0209 19:38:38.840743 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:38.847147 systemd[1]: Created slice kubepods-besteffort-pod66776931_ebc1_47b4_9ccf_ff20a1885347.slice. Feb 9 19:38:38.848329 kubelet[2407]: W0209 19:38:38.848289 2407 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:38.848454 kubelet[2407]: E0209 19:38:38.848343 2407 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:38.848454 kubelet[2407]: W0209 19:38:38.848422 2407 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:38.848454 kubelet[2407]: E0209 19:38:38.848438 2407 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:38.972692 kubelet[2407]: I0209 19:38:38.972617 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/66776931-ebc1-47b4-9ccf-ff20a1885347-lib-modules\") pod \"kube-proxy-dq5tm\" (UID: \"66776931-ebc1-47b4-9ccf-ff20a1885347\") " pod="kube-system/kube-proxy-dq5tm" Feb 9 19:38:38.972940 kubelet[2407]: I0209 19:38:38.972755 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2gxrv\" (UniqueName: \"kubernetes.io/projected/66776931-ebc1-47b4-9ccf-ff20a1885347-kube-api-access-2gxrv\") pod \"kube-proxy-dq5tm\" (UID: \"66776931-ebc1-47b4-9ccf-ff20a1885347\") " pod="kube-system/kube-proxy-dq5tm" Feb 9 19:38:38.972940 kubelet[2407]: I0209 19:38:38.972839 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/66776931-ebc1-47b4-9ccf-ff20a1885347-kube-proxy\") pod \"kube-proxy-dq5tm\" (UID: \"66776931-ebc1-47b4-9ccf-ff20a1885347\") " pod="kube-system/kube-proxy-dq5tm" Feb 9 19:38:38.972940 kubelet[2407]: I0209 19:38:38.972925 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/66776931-ebc1-47b4-9ccf-ff20a1885347-xtables-lock\") pod \"kube-proxy-dq5tm\" (UID: \"66776931-ebc1-47b4-9ccf-ff20a1885347\") " pod="kube-system/kube-proxy-dq5tm" Feb 9 19:38:39.423471 kubelet[2407]: I0209 19:38:39.423426 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:39.429751 systemd[1]: Created slice kubepods-besteffort-pod640dec0e_89e2_44eb_ae6c_f39dcf778e4f.slice. Feb 9 19:38:39.476640 kubelet[2407]: I0209 19:38:39.476584 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/640dec0e-89e2-44eb-ae6c-f39dcf778e4f-var-lib-calico\") pod \"tigera-operator-7ff8dc855-pbw9n\" (UID: \"640dec0e-89e2-44eb-ae6c-f39dcf778e4f\") " pod="tigera-operator/tigera-operator-7ff8dc855-pbw9n" Feb 9 19:38:39.476640 kubelet[2407]: I0209 19:38:39.476643 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-phtzx\" (UniqueName: \"kubernetes.io/projected/640dec0e-89e2-44eb-ae6c-f39dcf778e4f-kube-api-access-phtzx\") pod \"tigera-operator-7ff8dc855-pbw9n\" (UID: \"640dec0e-89e2-44eb-ae6c-f39dcf778e4f\") " pod="tigera-operator/tigera-operator-7ff8dc855-pbw9n" Feb 9 19:38:39.734804 env[1321]: time="2024-02-09T19:38:39.734679154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-pbw9n,Uid:640dec0e-89e2-44eb-ae6c-f39dcf778e4f,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:38:39.770228 env[1321]: time="2024-02-09T19:38:39.769992558Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:39.770228 env[1321]: time="2024-02-09T19:38:39.770049159Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:39.770228 env[1321]: time="2024-02-09T19:38:39.770068259Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:39.770663 env[1321]: time="2024-02-09T19:38:39.770589063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a pid=2492 runtime=io.containerd.runc.v2 Feb 9 19:38:39.796252 systemd[1]: Started cri-containerd-9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a.scope. Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.808000 audit: BPF prog-id=107 op=LOAD Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:39.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313665656532323031636638646331633939616139643661656239 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:39.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313665656532323031636638646331633939616139643661656239 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.809000 audit: BPF prog-id=108 op=LOAD Feb 9 19:38:39.809000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00030ca00 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:39.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313665656532323031636638646331633939616139643661656239 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.810000 audit: BPF prog-id=109 op=LOAD Feb 9 19:38:39.810000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00030ca48 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:39.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313665656532323031636638646331633939616139643661656239 Feb 9 19:38:39.810000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:38:39.811000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:39.811000 audit: BPF prog-id=110 op=LOAD Feb 9 19:38:39.811000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00030ce58 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:39.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313665656532323031636638646331633939616139643661656239 Feb 9 19:38:39.843311 env[1321]: time="2024-02-09T19:38:39.843251588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-pbw9n,Uid:640dec0e-89e2-44eb-ae6c-f39dcf778e4f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a\"" Feb 9 19:38:39.846206 env[1321]: time="2024-02-09T19:38:39.845261905Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:38:40.083522 kubelet[2407]: E0209 19:38:40.083472 2407 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:38:40.083522 kubelet[2407]: E0209 19:38:40.083521 2407 projected.go:198] Error preparing data for projected volume kube-api-access-2gxrv for pod kube-system/kube-proxy-dq5tm: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:38:40.083806 kubelet[2407]: E0209 19:38:40.083623 2407 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/66776931-ebc1-47b4-9ccf-ff20a1885347-kube-api-access-2gxrv podName:66776931-ebc1-47b4-9ccf-ff20a1885347 nodeName:}" failed. No retries permitted until 2024-02-09 19:38:40.583594041 +0000 UTC m=+15.875535139 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-2gxrv" (UniqueName: "kubernetes.io/projected/66776931-ebc1-47b4-9ccf-ff20a1885347-kube-api-access-2gxrv") pod "kube-proxy-dq5tm" (UID: "66776931-ebc1-47b4-9ccf-ff20a1885347") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:38:40.592029 systemd[1]: run-containerd-runc-k8s.io-9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a-runc.WCbTYS.mount: Deactivated successfully. Feb 9 19:38:40.656924 env[1321]: time="2024-02-09T19:38:40.656872575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dq5tm,Uid:66776931-ebc1-47b4-9ccf-ff20a1885347,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:40.701636 env[1321]: time="2024-02-09T19:38:40.701564552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:40.701636 env[1321]: time="2024-02-09T19:38:40.701602552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:40.701902 env[1321]: time="2024-02-09T19:38:40.701616153Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:40.701985 env[1321]: time="2024-02-09T19:38:40.701922055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff pid=2533 runtime=io.containerd.runc.v2 Feb 9 19:38:40.725180 systemd[1]: run-containerd-runc-k8s.io-b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff-runc.2ukMNk.mount: Deactivated successfully. Feb 9 19:38:40.729447 systemd[1]: Started cri-containerd-b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff.scope. Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit: BPF prog-id=111 op=LOAD Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2533 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231323832666563303934666639663639383062323063316563643361 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2533 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231323832666563303934666639663639383062323063316563643361 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit: BPF prog-id=112 op=LOAD Feb 9 19:38:40.746000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e78b0 items=0 ppid=2533 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231323832666563303934666639663639383062323063316563643361 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.746000 audit: BPF prog-id=113 op=LOAD Feb 9 19:38:40.746000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e78f8 items=0 ppid=2533 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231323832666563303934666639663639383062323063316563643361 Feb 9 19:38:40.747000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:38:40.747000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.747000 audit: BPF prog-id=114 op=LOAD Feb 9 19:38:40.747000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e7d08 items=0 ppid=2533 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231323832666563303934666639663639383062323063316563643361 Feb 9 19:38:40.764920 env[1321]: time="2024-02-09T19:38:40.764859486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dq5tm,Uid:66776931-ebc1-47b4-9ccf-ff20a1885347,Namespace:kube-system,Attempt:0,} returns sandbox id \"b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff\"" Feb 9 19:38:40.768348 env[1321]: time="2024-02-09T19:38:40.768305215Z" level=info msg="CreateContainer within sandbox \"b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:38:40.803368 env[1321]: time="2024-02-09T19:38:40.803308910Z" level=info msg="CreateContainer within sandbox \"b1282fec094ff9f6980b20c1ecd3a1649c79a2de187cc7c16813cd8a753309ff\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"752cf5e9c3890561dbfafad6fea18a28ac8b68929e26f8831f1a2131c7503196\"" Feb 9 19:38:40.804284 env[1321]: time="2024-02-09T19:38:40.804247218Z" level=info msg="StartContainer for \"752cf5e9c3890561dbfafad6fea18a28ac8b68929e26f8831f1a2131c7503196\"" Feb 9 19:38:40.823059 systemd[1]: Started cri-containerd-752cf5e9c3890561dbfafad6fea18a28ac8b68929e26f8831f1a2131c7503196.scope. Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2533 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326366356539633338393035363164626661666164366665613138 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit: BPF prog-id=115 op=LOAD Feb 9 19:38:40.839000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0000254b0 items=0 ppid=2533 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326366356539633338393035363164626661666164366665613138 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit: BPF prog-id=116 op=LOAD Feb 9 19:38:40.839000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0000254f8 items=0 ppid=2533 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326366356539633338393035363164626661666164366665613138 Feb 9 19:38:40.839000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:38:40.839000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:40.839000 audit: BPF prog-id=117 op=LOAD Feb 9 19:38:40.839000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000025588 items=0 ppid=2533 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326366356539633338393035363164626661666164366665613138 Feb 9 19:38:40.874522 env[1321]: time="2024-02-09T19:38:40.874455110Z" level=info msg="StartContainer for \"752cf5e9c3890561dbfafad6fea18a28ac8b68929e26f8831f1a2131c7503196\" returns successfully" Feb 9 19:38:40.943000 audit[2624]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:40.943000 audit[2624]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0e72f8a0 a2=0 a3=7fff0e72f88c items=0 ppid=2587 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:38:40.945000 audit[2625]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:40.945000 audit[2625]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8926c4c0 a2=0 a3=7ffd8926c4ac items=0 ppid=2587 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:38:40.947000 audit[2626]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:40.947000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe76be70a0 a2=0 a3=7ffe76be708c items=0 ppid=2587 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:38:40.949000 audit[2627]: NETFILTER_CFG table=mangle:47 family=2 entries=1 op=nft_register_chain pid=2627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:40.949000 audit[2627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7fbbb480 a2=0 a3=7ffc7fbbb46c items=0 ppid=2587 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:38:40.954000 audit[2628]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:40.954000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5fc49290 a2=0 a3=7ffe5fc4927c items=0 ppid=2587 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:38:40.956000 audit[2629]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:40.956000 audit[2629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb8420b00 a2=0 a3=7fffb8420aec items=0 ppid=2587 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:40.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:38:41.047000 audit[2631]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.047000 audit[2631]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd7b27e20 a2=0 a3=7ffcd7b27e0c items=0 ppid=2587 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:38:41.050000 audit[2633]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.050000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe29eb7b80 a2=0 a3=7ffe29eb7b6c items=0 ppid=2587 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:38:41.056000 audit[2636]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.056000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffee7d5e3c0 a2=0 a3=7ffee7d5e3ac items=0 ppid=2587 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:38:41.058000 audit[2637]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.058000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0c5bfd00 a2=0 a3=7ffc0c5bfcec items=0 ppid=2587 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:38:41.060000 audit[2639]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.060000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff35125a20 a2=0 a3=7fff35125a0c items=0 ppid=2587 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:38:41.061000 audit[2640]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.061000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8c65ff20 a2=0 a3=7ffc8c65ff0c items=0 ppid=2587 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:38:41.064000 audit[2642]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.064000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec585f8d0 a2=0 a3=7ffec585f8bc items=0 ppid=2587 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:38:41.068000 audit[2645]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.068000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe67a7fe10 a2=0 a3=7ffe67a7fdfc items=0 ppid=2587 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:38:41.069000 audit[2646]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.069000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc282b6690 a2=0 a3=7ffc282b667c items=0 ppid=2587 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:38:41.072000 audit[2648]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.072000 audit[2648]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc194b6090 a2=0 a3=7ffc194b607c items=0 ppid=2587 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:38:41.073000 audit[2649]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_chain pid=2649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.073000 audit[2649]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5457f0b0 a2=0 a3=7ffe5457f09c items=0 ppid=2587 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:38:41.076000 audit[2651]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.076000 audit[2651]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7a2b7e60 a2=0 a3=7ffd7a2b7e4c items=0 ppid=2587 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:38:41.079000 audit[2654]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.079000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebadb1c30 a2=0 a3=7ffebadb1c1c items=0 ppid=2587 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:38:41.083000 audit[2657]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.083000 audit[2657]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffeb88a6e0 a2=0 a3=7fffeb88a6cc items=0 ppid=2587 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:38:41.085000 audit[2658]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.085000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb636d0b0 a2=0 a3=7ffeb636d09c items=0 ppid=2587 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:38:41.088000 audit[2660]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.088000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffde8863c60 a2=0 a3=7ffde8863c4c items=0 ppid=2587 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:38:41.091000 audit[2663]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.091000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb5c3fa40 a2=0 a3=7ffcb5c3fa2c items=0 ppid=2587 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:38:41.098000 audit[2668]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_chain pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.098000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4408b940 a2=0 a3=7ffd4408b92c items=0 ppid=2587 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:38:41.101000 audit[2670]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:41.101000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe032570d0 a2=0 a3=7ffe032570bc items=0 ppid=2587 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:38:41.141000 audit[2672]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:41.141000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdbfc87440 a2=0 a3=7ffdbfc8742c items=0 ppid=2587 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:41.162000 audit[2672]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:41.162000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdbfc87440 a2=0 a3=7ffdbfc8742c items=0 ppid=2587 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:41.164000 audit[2677]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.164000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff7b3fced0 a2=0 a3=7fff7b3fcebc items=0 ppid=2587 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.164000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:38:41.166000 audit[2679]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.166000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff533de260 a2=0 a3=7fff533de24c items=0 ppid=2587 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:38:41.171000 audit[2682]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.171000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec3f3acd0 a2=0 a3=7ffec3f3acbc items=0 ppid=2587 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:38:41.172000 audit[2683]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.172000 audit[2683]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7c2c8790 a2=0 a3=7fff7c2c877c items=0 ppid=2587 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:38:41.174000 audit[2685]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.174000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6f594880 a2=0 a3=7ffc6f59486c items=0 ppid=2587 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:38:41.175000 audit[2686]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.175000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4e65c580 a2=0 a3=7ffd4e65c56c items=0 ppid=2587 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:38:41.178000 audit[2688]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.178000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8b63a4e0 a2=0 a3=7ffe8b63a4cc items=0 ppid=2587 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:38:41.182000 audit[2691]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.182000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe4de92c90 a2=0 a3=7ffe4de92c7c items=0 ppid=2587 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:38:41.183000 audit[2692]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.183000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd44a340c0 a2=0 a3=7ffd44a340ac items=0 ppid=2587 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:38:41.186000 audit[2694]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.186000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce2926eb0 a2=0 a3=7ffce2926e9c items=0 ppid=2587 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:38:41.187000 audit[2695]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.187000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd06571380 a2=0 a3=7ffd0657136c items=0 ppid=2587 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:38:41.190000 audit[2697]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.190000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc31ed0550 a2=0 a3=7ffc31ed053c items=0 ppid=2587 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:38:41.193000 audit[2700]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.193000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd624f1150 a2=0 a3=7ffd624f113c items=0 ppid=2587 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:38:41.197000 audit[2703]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.197000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcda0e2270 a2=0 a3=7ffcda0e225c items=0 ppid=2587 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:38:41.199000 audit[2704]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.199000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdef795c50 a2=0 a3=7ffdef795c3c items=0 ppid=2587 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:38:41.202000 audit[2707]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.202000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8f48d130 a2=0 a3=7ffc8f48d11c items=0 ppid=2587 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:38:41.205000 audit[2710]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.205000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbb545190 a2=0 a3=7ffcbb54517c items=0 ppid=2587 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:38:41.207000 audit[2711]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.207000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9da7370 a2=0 a3=7ffde9da735c items=0 ppid=2587 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:38:41.209000 audit[2713]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.209000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6ccaf0e0 a2=0 a3=7fff6ccaf0cc items=0 ppid=2587 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:41.213000 audit[2716]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.213000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff47c585d0 a2=0 a3=7fff47c585bc items=0 ppid=2587 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:41.215000 audit[2717]: NETFILTER_CFG table=nat:91 family=10 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.215000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca6c5ff0 a2=0 a3=7ffcca6c5fdc items=0 ppid=2587 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:38:41.217000 audit[2719]: NETFILTER_CFG table=nat:92 family=10 entries=2 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:41.217000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe416f4460 a2=0 a3=7ffe416f444c items=0 ppid=2587 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:38:41.221000 audit[2721]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:38:41.221000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd844a8040 a2=0 a3=7ffd844a802c items=0 ppid=2587 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.221000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:41.221000 audit[2721]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:38:41.221000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd844a8040 a2=0 a3=7ffd844a802c items=0 ppid=2587 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:41.221000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:42.324408 env[1321]: time="2024-02-09T19:38:42.324338476Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:42.331525 env[1321]: time="2024-02-09T19:38:42.331474534Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:42.336294 env[1321]: time="2024-02-09T19:38:42.336245373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:42.340944 env[1321]: time="2024-02-09T19:38:42.340898310Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:42.341553 env[1321]: time="2024-02-09T19:38:42.341511815Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:38:42.345923 env[1321]: time="2024-02-09T19:38:42.345879451Z" level=info msg="CreateContainer within sandbox \"9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:38:42.372274 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3517124818.mount: Deactivated successfully. Feb 9 19:38:42.388874 env[1321]: time="2024-02-09T19:38:42.388810199Z" level=info msg="CreateContainer within sandbox \"9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8\"" Feb 9 19:38:42.391268 env[1321]: time="2024-02-09T19:38:42.389745107Z" level=info msg="StartContainer for \"49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8\"" Feb 9 19:38:42.409291 systemd[1]: Started cri-containerd-49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8.scope. Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.424000 audit: BPF prog-id=118 op=LOAD Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2492 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:42.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439626439393164393061376366303939393432343465346531623036 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2492 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:42.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439626439393164393061376366303939393432343465346531623036 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.425000 audit: BPF prog-id=119 op=LOAD Feb 9 19:38:42.425000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dda40 items=0 ppid=2492 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:42.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439626439393164393061376366303939393432343465346531623036 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit: BPF prog-id=120 op=LOAD Feb 9 19:38:42.426000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dda88 items=0 ppid=2492 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:42.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439626439393164393061376366303939393432343465346531623036 Feb 9 19:38:42.426000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:38:42.426000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:42.426000 audit: BPF prog-id=121 op=LOAD Feb 9 19:38:42.426000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001dde98 items=0 ppid=2492 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:42.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439626439393164393061376366303939393432343465346531623036 Feb 9 19:38:42.446573 env[1321]: time="2024-02-09T19:38:42.446509468Z" level=info msg="StartContainer for \"49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8\" returns successfully" Feb 9 19:38:43.019015 kubelet[2407]: I0209 19:38:43.018338 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-pbw9n" podStartSLOduration=1.520832287 podCreationTimestamp="2024-02-09 19:38:39 +0000 UTC" firstStartedPulling="2024-02-09 19:38:39.844523499 +0000 UTC m=+15.136464697" lastFinishedPulling="2024-02-09 19:38:42.341965019 +0000 UTC m=+17.633906217" observedRunningTime="2024-02-09 19:38:43.018037605 +0000 UTC m=+18.309978703" watchObservedRunningTime="2024-02-09 19:38:43.018273807 +0000 UTC m=+18.310215005" Feb 9 19:38:43.019015 kubelet[2407]: I0209 19:38:43.018632 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dq5tm" podStartSLOduration=5.01858891 podCreationTimestamp="2024-02-09 19:38:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:41.012913376 +0000 UTC m=+16.304854574" watchObservedRunningTime="2024-02-09 19:38:43.01858891 +0000 UTC m=+18.310530008" Feb 9 19:38:44.512000 audit[2760]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.518428 kernel: kauditd_printk_skb: 369 callbacks suppressed Feb 9 19:38:44.518528 kernel: audit: type=1325 audit(1707507524.512:1003): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.512000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff6892fbd0 a2=0 a3=7fff6892fbbc items=0 ppid=2587 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.529411 kernel: audit: type=1300 audit(1707507524.512:1003): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff6892fbd0 a2=0 a3=7fff6892fbbc items=0 ppid=2587 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.549415 kernel: audit: type=1327 audit(1707507524.512:1003): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.558000 audit[2760]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.558000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff6892fbd0 a2=0 a3=31030 items=0 ppid=2587 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.602340 kernel: audit: type=1325 audit(1707507524.558:1004): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.602495 kernel: audit: type=1300 audit(1707507524.558:1004): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff6892fbd0 a2=0 a3=31030 items=0 ppid=2587 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.602518 kernel: audit: type=1327 audit(1707507524.558:1004): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.649669 kubelet[2407]: I0209 19:38:44.649601 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:44.657619 systemd[1]: Created slice kubepods-besteffort-pod63b8e649_6af7_456c_9958_77261a95d63d.slice. Feb 9 19:38:44.660995 kubelet[2407]: W0209 19:38:44.660957 2407 reflector.go:533] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.661180 kubelet[2407]: E0209 19:38:44.661168 2407 reflector.go:148] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.661362 kubelet[2407]: W0209 19:38:44.661347 2407 reflector.go:533] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.661511 kubelet[2407]: E0209 19:38:44.661498 2407 reflector.go:148] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.661640 kubelet[2407]: W0209 19:38:44.661429 2407 reflector.go:533] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.661749 kubelet[2407]: E0209 19:38:44.661738 2407 reflector.go:148] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:38:44.690000 audit[2762]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.705432 kernel: audit: type=1325 audit(1707507524.690:1005): table=filter:97 family=2 entries=16 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.705572 kernel: audit: type=1300 audit(1707507524.690:1005): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd187cacd0 a2=0 a3=7ffd187cacbc items=0 ppid=2587 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.690000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd187cacd0 a2=0 a3=7ffd187cacbc items=0 ppid=2587 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.715116 kubelet[2407]: I0209 19:38:44.715078 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/63b8e649-6af7-456c-9958-77261a95d63d-tigera-ca-bundle\") pod \"calico-typha-7584cf9f78-rjlnz\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " pod="calico-system/calico-typha-7584cf9f78-rjlnz" Feb 9 19:38:44.715409 kubelet[2407]: I0209 19:38:44.715386 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/63b8e649-6af7-456c-9958-77261a95d63d-typha-certs\") pod \"calico-typha-7584cf9f78-rjlnz\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " pod="calico-system/calico-typha-7584cf9f78-rjlnz" Feb 9 19:38:44.715512 kubelet[2407]: I0209 19:38:44.715504 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8v2kv\" (UniqueName: \"kubernetes.io/projected/63b8e649-6af7-456c-9958-77261a95d63d-kube-api-access-8v2kv\") pod \"calico-typha-7584cf9f78-rjlnz\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " pod="calico-system/calico-typha-7584cf9f78-rjlnz" Feb 9 19:38:44.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.735417 kernel: audit: type=1327 audit(1707507524.690:1005): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.734000 audit[2762]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.747412 kernel: audit: type=1325 audit(1707507524.734:1006): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:44.734000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd187cacd0 a2=0 a3=31030 items=0 ppid=2587 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:44.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:44.775150 kubelet[2407]: I0209 19:38:44.775012 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:44.780953 systemd[1]: Created slice kubepods-besteffort-pod4de9d091_3289_4dfa_83ac_1fda29aae7f1.slice. Feb 9 19:38:44.816580 kubelet[2407]: I0209 19:38:44.816547 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-policysync\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817122 kubelet[2407]: I0209 19:38:44.817099 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-run-calico\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817298 kubelet[2407]: I0209 19:38:44.817285 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-net-dir\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817421 kubelet[2407]: I0209 19:38:44.817387 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-bin-dir\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817528 kubelet[2407]: I0209 19:38:44.817519 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-lib-modules\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817626 kubelet[2407]: I0209 19:38:44.817618 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-xtables-lock\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817707 kubelet[2407]: I0209 19:38:44.817700 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4de9d091-3289-4dfa-83ac-1fda29aae7f1-tigera-ca-bundle\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817793 kubelet[2407]: I0209 19:38:44.817784 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-flexvol-driver-host\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.817904 kubelet[2407]: I0209 19:38:44.817893 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-lib-calico\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.818008 kubelet[2407]: I0209 19:38:44.817998 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-log-dir\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.818101 kubelet[2407]: I0209 19:38:44.818089 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4de9d091-3289-4dfa-83ac-1fda29aae7f1-node-certs\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.818189 kubelet[2407]: I0209 19:38:44.818180 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-czqh6\" (UniqueName: \"kubernetes.io/projected/4de9d091-3289-4dfa-83ac-1fda29aae7f1-kube-api-access-czqh6\") pod \"calico-node-ftrg5\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " pod="calico-system/calico-node-ftrg5" Feb 9 19:38:44.909086 kubelet[2407]: I0209 19:38:44.909045 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:44.909421 kubelet[2407]: E0209 19:38:44.909387 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:44.921943 kubelet[2407]: I0209 19:38:44.921912 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7d41cefc-5827-4c72-a472-2588d552dd8b-socket-dir\") pod \"csi-node-driver-mpmzs\" (UID: \"7d41cefc-5827-4c72-a472-2588d552dd8b\") " pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:38:44.922641 kubelet[2407]: I0209 19:38:44.922621 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7d41cefc-5827-4c72-a472-2588d552dd8b-varrun\") pod \"csi-node-driver-mpmzs\" (UID: \"7d41cefc-5827-4c72-a472-2588d552dd8b\") " pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:38:44.922859 kubelet[2407]: I0209 19:38:44.922841 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7d41cefc-5827-4c72-a472-2588d552dd8b-kubelet-dir\") pod \"csi-node-driver-mpmzs\" (UID: \"7d41cefc-5827-4c72-a472-2588d552dd8b\") " pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:38:44.923022 kubelet[2407]: I0209 19:38:44.922995 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7d41cefc-5827-4c72-a472-2588d552dd8b-registration-dir\") pod \"csi-node-driver-mpmzs\" (UID: \"7d41cefc-5827-4c72-a472-2588d552dd8b\") " pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:38:44.923192 kubelet[2407]: I0209 19:38:44.923175 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-twlvc\" (UniqueName: \"kubernetes.io/projected/7d41cefc-5827-4c72-a472-2588d552dd8b-kube-api-access-twlvc\") pod \"csi-node-driver-mpmzs\" (UID: \"7d41cefc-5827-4c72-a472-2588d552dd8b\") " pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:38:44.934757 kubelet[2407]: E0209 19:38:44.934739 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:44.934897 kubelet[2407]: W0209 19:38:44.934882 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:44.934997 kubelet[2407]: E0209 19:38:44.934983 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.024735 kubelet[2407]: E0209 19:38:45.024700 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.024735 kubelet[2407]: W0209 19:38:45.024725 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.024735 kubelet[2407]: E0209 19:38:45.024748 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.025084 kubelet[2407]: E0209 19:38:45.024974 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.025084 kubelet[2407]: W0209 19:38:45.024985 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.025084 kubelet[2407]: E0209 19:38:45.025000 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.025343 kubelet[2407]: E0209 19:38:45.025243 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.025343 kubelet[2407]: W0209 19:38:45.025260 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.025343 kubelet[2407]: E0209 19:38:45.025279 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.027208 kubelet[2407]: E0209 19:38:45.027179 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.027208 kubelet[2407]: W0209 19:38:45.027199 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.027375 kubelet[2407]: E0209 19:38:45.027295 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.027460 kubelet[2407]: E0209 19:38:45.027442 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.027512 kubelet[2407]: W0209 19:38:45.027461 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.027586 kubelet[2407]: E0209 19:38:45.027555 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.027694 kubelet[2407]: E0209 19:38:45.027681 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.027759 kubelet[2407]: W0209 19:38:45.027694 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.027759 kubelet[2407]: E0209 19:38:45.027712 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.027922 kubelet[2407]: E0209 19:38:45.027907 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.027997 kubelet[2407]: W0209 19:38:45.027922 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.027997 kubelet[2407]: E0209 19:38:45.027940 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.028150 kubelet[2407]: E0209 19:38:45.028137 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.028211 kubelet[2407]: W0209 19:38:45.028151 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.028211 kubelet[2407]: E0209 19:38:45.028172 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.028436 kubelet[2407]: E0209 19:38:45.028421 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.028436 kubelet[2407]: W0209 19:38:45.028435 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.028551 kubelet[2407]: E0209 19:38:45.028461 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.028681 kubelet[2407]: E0209 19:38:45.028665 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.028681 kubelet[2407]: W0209 19:38:45.028681 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.028782 kubelet[2407]: E0209 19:38:45.028763 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.028951 kubelet[2407]: E0209 19:38:45.028926 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.028951 kubelet[2407]: W0209 19:38:45.028942 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.029078 kubelet[2407]: E0209 19:38:45.028960 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.029167 kubelet[2407]: E0209 19:38:45.029153 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.029236 kubelet[2407]: W0209 19:38:45.029168 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.029236 kubelet[2407]: E0209 19:38:45.029186 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.029590 kubelet[2407]: E0209 19:38:45.029571 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.029590 kubelet[2407]: W0209 19:38:45.029588 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.029737 kubelet[2407]: E0209 19:38:45.029607 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.029810 kubelet[2407]: E0209 19:38:45.029792 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.029810 kubelet[2407]: W0209 19:38:45.029807 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.029912 kubelet[2407]: E0209 19:38:45.029826 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.030076 kubelet[2407]: E0209 19:38:45.030060 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.030076 kubelet[2407]: W0209 19:38:45.030076 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.030204 kubelet[2407]: E0209 19:38:45.030161 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.030327 kubelet[2407]: E0209 19:38:45.030313 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.030414 kubelet[2407]: W0209 19:38:45.030328 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.030501 kubelet[2407]: E0209 19:38:45.030486 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.030631 kubelet[2407]: E0209 19:38:45.030618 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.030695 kubelet[2407]: W0209 19:38:45.030632 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.030695 kubelet[2407]: E0209 19:38:45.030651 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.030856 kubelet[2407]: E0209 19:38:45.030842 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.030908 kubelet[2407]: W0209 19:38:45.030856 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.030908 kubelet[2407]: E0209 19:38:45.030874 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.031077 kubelet[2407]: E0209 19:38:45.031064 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.031126 kubelet[2407]: W0209 19:38:45.031078 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.031126 kubelet[2407]: E0209 19:38:45.031095 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.031342 kubelet[2407]: E0209 19:38:45.031327 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.031342 kubelet[2407]: W0209 19:38:45.031342 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.031486 kubelet[2407]: E0209 19:38:45.031473 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.031614 kubelet[2407]: E0209 19:38:45.031601 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.031666 kubelet[2407]: W0209 19:38:45.031614 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.031722 kubelet[2407]: E0209 19:38:45.031692 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.031834 kubelet[2407]: E0209 19:38:45.031820 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.031887 kubelet[2407]: W0209 19:38:45.031835 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.031928 kubelet[2407]: E0209 19:38:45.031911 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.032039 kubelet[2407]: E0209 19:38:45.032026 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.032092 kubelet[2407]: W0209 19:38:45.032039 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.032152 kubelet[2407]: E0209 19:38:45.032116 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.032243 kubelet[2407]: E0209 19:38:45.032230 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.032294 kubelet[2407]: W0209 19:38:45.032244 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.032294 kubelet[2407]: E0209 19:38:45.032263 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.032474 kubelet[2407]: E0209 19:38:45.032461 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.032474 kubelet[2407]: W0209 19:38:45.032474 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.032592 kubelet[2407]: E0209 19:38:45.032492 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.032688 kubelet[2407]: E0209 19:38:45.032675 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.032736 kubelet[2407]: W0209 19:38:45.032690 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.032736 kubelet[2407]: E0209 19:38:45.032708 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.032905 kubelet[2407]: E0209 19:38:45.032891 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.032956 kubelet[2407]: W0209 19:38:45.032906 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.032956 kubelet[2407]: E0209 19:38:45.032922 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.033152 kubelet[2407]: E0209 19:38:45.033138 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.033152 kubelet[2407]: W0209 19:38:45.033152 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.033237 kubelet[2407]: E0209 19:38:45.033169 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.033705 kubelet[2407]: E0209 19:38:45.033685 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.033705 kubelet[2407]: W0209 19:38:45.033702 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.033843 kubelet[2407]: E0209 19:38:45.033717 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.033950 kubelet[2407]: E0209 19:38:45.033931 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.033950 kubelet[2407]: W0209 19:38:45.033947 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.034042 kubelet[2407]: E0209 19:38:45.033962 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.133160 kubelet[2407]: E0209 19:38:45.133125 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.133160 kubelet[2407]: W0209 19:38:45.133153 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.133509 kubelet[2407]: E0209 19:38:45.133180 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.133509 kubelet[2407]: E0209 19:38:45.133459 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.133509 kubelet[2407]: W0209 19:38:45.133481 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.133509 kubelet[2407]: E0209 19:38:45.133499 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.133726 kubelet[2407]: E0209 19:38:45.133710 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.133726 kubelet[2407]: W0209 19:38:45.133727 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.133828 kubelet[2407]: E0209 19:38:45.133742 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.133950 kubelet[2407]: E0209 19:38:45.133935 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.134000 kubelet[2407]: W0209 19:38:45.133950 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.134000 kubelet[2407]: E0209 19:38:45.133965 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.134176 kubelet[2407]: E0209 19:38:45.134160 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.134242 kubelet[2407]: W0209 19:38:45.134176 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.134242 kubelet[2407]: E0209 19:38:45.134192 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.134406 kubelet[2407]: E0209 19:38:45.134380 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.134465 kubelet[2407]: W0209 19:38:45.134406 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.134465 kubelet[2407]: E0209 19:38:45.134421 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.235262 kubelet[2407]: E0209 19:38:45.235234 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.235472 kubelet[2407]: W0209 19:38:45.235454 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.235607 kubelet[2407]: E0209 19:38:45.235595 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.235929 kubelet[2407]: E0209 19:38:45.235915 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.236028 kubelet[2407]: W0209 19:38:45.236017 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.236104 kubelet[2407]: E0209 19:38:45.236094 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.236455 kubelet[2407]: E0209 19:38:45.236441 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.236572 kubelet[2407]: W0209 19:38:45.236559 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.236650 kubelet[2407]: E0209 19:38:45.236641 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.236919 kubelet[2407]: E0209 19:38:45.236906 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.237024 kubelet[2407]: W0209 19:38:45.237012 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.237095 kubelet[2407]: E0209 19:38:45.237086 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.237361 kubelet[2407]: E0209 19:38:45.237350 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.237462 kubelet[2407]: W0209 19:38:45.237451 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.237551 kubelet[2407]: E0209 19:38:45.237542 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.237797 kubelet[2407]: E0209 19:38:45.237788 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.237876 kubelet[2407]: W0209 19:38:45.237867 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.237947 kubelet[2407]: E0209 19:38:45.237940 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.341427 kubelet[2407]: E0209 19:38:45.341366 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.341645 kubelet[2407]: W0209 19:38:45.341626 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.341728 kubelet[2407]: E0209 19:38:45.341719 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.342078 kubelet[2407]: E0209 19:38:45.342062 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.342186 kubelet[2407]: W0209 19:38:45.342175 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.342256 kubelet[2407]: E0209 19:38:45.342248 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.343598 kubelet[2407]: E0209 19:38:45.343583 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.343698 kubelet[2407]: W0209 19:38:45.343688 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.343765 kubelet[2407]: E0209 19:38:45.343758 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.344060 kubelet[2407]: E0209 19:38:45.344047 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.344146 kubelet[2407]: W0209 19:38:45.344137 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.344226 kubelet[2407]: E0209 19:38:45.344219 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.346495 kubelet[2407]: E0209 19:38:45.346480 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.346589 kubelet[2407]: W0209 19:38:45.346578 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.346659 kubelet[2407]: E0209 19:38:45.346649 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.346953 kubelet[2407]: E0209 19:38:45.346941 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.347039 kubelet[2407]: W0209 19:38:45.347030 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.347108 kubelet[2407]: E0209 19:38:45.347101 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.448082 kubelet[2407]: E0209 19:38:45.448044 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.448082 kubelet[2407]: W0209 19:38:45.448073 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.448368 kubelet[2407]: E0209 19:38:45.448103 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.448368 kubelet[2407]: E0209 19:38:45.448346 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.448368 kubelet[2407]: W0209 19:38:45.448358 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.448545 kubelet[2407]: E0209 19:38:45.448376 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.448620 kubelet[2407]: E0209 19:38:45.448601 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.448668 kubelet[2407]: W0209 19:38:45.448622 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.448668 kubelet[2407]: E0209 19:38:45.448637 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.448856 kubelet[2407]: E0209 19:38:45.448840 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.448856 kubelet[2407]: W0209 19:38:45.448856 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.448974 kubelet[2407]: E0209 19:38:45.448872 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.449078 kubelet[2407]: E0209 19:38:45.449062 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.449127 kubelet[2407]: W0209 19:38:45.449078 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.449127 kubelet[2407]: E0209 19:38:45.449093 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.449300 kubelet[2407]: E0209 19:38:45.449284 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.449360 kubelet[2407]: W0209 19:38:45.449301 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.449360 kubelet[2407]: E0209 19:38:45.449315 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.550525 kubelet[2407]: E0209 19:38:45.550485 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.550525 kubelet[2407]: W0209 19:38:45.550515 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.550818 kubelet[2407]: E0209 19:38:45.550543 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.550876 kubelet[2407]: E0209 19:38:45.550832 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.550876 kubelet[2407]: W0209 19:38:45.550844 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.550876 kubelet[2407]: E0209 19:38:45.550861 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.551119 kubelet[2407]: E0209 19:38:45.551099 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.551119 kubelet[2407]: W0209 19:38:45.551117 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.551270 kubelet[2407]: E0209 19:38:45.551135 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.551355 kubelet[2407]: E0209 19:38:45.551338 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.551420 kubelet[2407]: W0209 19:38:45.551356 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.551420 kubelet[2407]: E0209 19:38:45.551371 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.551615 kubelet[2407]: E0209 19:38:45.551597 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.551615 kubelet[2407]: W0209 19:38:45.551614 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.551722 kubelet[2407]: E0209 19:38:45.551629 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.551835 kubelet[2407]: E0209 19:38:45.551819 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.551898 kubelet[2407]: W0209 19:38:45.551835 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.551898 kubelet[2407]: E0209 19:38:45.551854 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.567526 kubelet[2407]: E0209 19:38:45.567502 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.567723 kubelet[2407]: W0209 19:38:45.567704 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.567821 kubelet[2407]: E0209 19:38:45.567811 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.610246 kubelet[2407]: E0209 19:38:45.610144 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.610468 kubelet[2407]: W0209 19:38:45.610445 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.610593 kubelet[2407]: E0209 19:38:45.610581 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.616155 kubelet[2407]: E0209 19:38:45.616129 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.616335 kubelet[2407]: W0209 19:38:45.616315 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.616520 kubelet[2407]: E0209 19:38:45.616508 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.653299 kubelet[2407]: E0209 19:38:45.653272 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.653705 kubelet[2407]: W0209 19:38:45.653687 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.653777 kubelet[2407]: E0209 19:38:45.653768 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.654217 kubelet[2407]: E0209 19:38:45.654199 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.654334 kubelet[2407]: W0209 19:38:45.654319 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.654427 kubelet[2407]: E0209 19:38:45.654415 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.654758 kubelet[2407]: E0209 19:38:45.654743 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.654858 kubelet[2407]: W0209 19:38:45.654844 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.654948 kubelet[2407]: E0209 19:38:45.654937 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.756340 kubelet[2407]: E0209 19:38:45.756175 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.756340 kubelet[2407]: W0209 19:38:45.756203 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.756340 kubelet[2407]: E0209 19:38:45.756231 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.756696 kubelet[2407]: E0209 19:38:45.756489 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.756696 kubelet[2407]: W0209 19:38:45.756501 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.756696 kubelet[2407]: E0209 19:38:45.756518 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.756820 kubelet[2407]: E0209 19:38:45.756716 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.756820 kubelet[2407]: W0209 19:38:45.756727 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.756820 kubelet[2407]: E0209 19:38:45.756743 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.756965 kubelet[2407]: E0209 19:38:45.756920 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.756965 kubelet[2407]: W0209 19:38:45.756928 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.756965 kubelet[2407]: E0209 19:38:45.756946 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.765588 kubelet[2407]: E0209 19:38:45.765556 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:45.765588 kubelet[2407]: W0209 19:38:45.765581 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:45.765752 kubelet[2407]: E0209 19:38:45.765604 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:45.771000 audit[2841]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:45.771000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffec28d7310 a2=0 a3=7ffec28d72fc items=0 ppid=2587 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:45.772000 audit[2841]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:45.772000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffec28d7310 a2=0 a3=31030 items=0 ppid=2587 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:45.867610 env[1321]: time="2024-02-09T19:38:45.867461120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7584cf9f78-rjlnz,Uid:63b8e649-6af7-456c-9958-77261a95d63d,Namespace:calico-system,Attempt:0,}" Feb 9 19:38:45.911509 env[1321]: time="2024-02-09T19:38:45.908986739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:45.911509 env[1321]: time="2024-02-09T19:38:45.909069340Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:45.911509 env[1321]: time="2024-02-09T19:38:45.909097640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:45.911509 env[1321]: time="2024-02-09T19:38:45.909245241Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557 pid=2851 runtime=io.containerd.runc.v2 Feb 9 19:38:45.929334 systemd[1]: Started cri-containerd-269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557.scope. Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.955000 audit: BPF prog-id=122 op=LOAD Feb 9 19:38:45.956000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.956000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2851 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393837353932326335316166663162316531333532323831326633 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2851 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393837353932326335316166663162316531333532323831326633 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.957000 audit: BPF prog-id=123 op=LOAD Feb 9 19:38:45.957000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024370 items=0 ppid=2851 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393837353932326335316166663162316531333532323831326633 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.958000 audit: BPF prog-id=124 op=LOAD Feb 9 19:38:45.958000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000243b8 items=0 ppid=2851 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393837353932326335316166663162316531333532323831326633 Feb 9 19:38:45.959000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:38:45.959000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:45.959000 audit: BPF prog-id=125 op=LOAD Feb 9 19:38:45.959000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000247c8 items=0 ppid=2851 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:45.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393837353932326335316166663162316531333532323831326633 Feb 9 19:38:45.984814 env[1321]: time="2024-02-09T19:38:45.984760522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ftrg5,Uid:4de9d091-3289-4dfa-83ac-1fda29aae7f1,Namespace:calico-system,Attempt:0,}" Feb 9 19:38:46.002220 env[1321]: time="2024-02-09T19:38:46.002165755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7584cf9f78-rjlnz,Uid:63b8e649-6af7-456c-9958-77261a95d63d,Namespace:calico-system,Attempt:0,} returns sandbox id \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\"" Feb 9 19:38:46.004466 env[1321]: time="2024-02-09T19:38:46.004410872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:38:46.045512 env[1321]: time="2024-02-09T19:38:46.045420182Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:46.045693 env[1321]: time="2024-02-09T19:38:46.045523282Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:46.045693 env[1321]: time="2024-02-09T19:38:46.045551683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:46.045793 env[1321]: time="2024-02-09T19:38:46.045705584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453 pid=2888 runtime=io.containerd.runc.v2 Feb 9 19:38:46.084167 systemd[1]: Started cri-containerd-22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453.scope. Feb 9 19:38:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit: BPF prog-id=126 op=LOAD Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2888 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:46.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653833383534333263646533663565653966376461373961326137 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2888 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:46.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653833383534333263646533663565653966376461373961326137 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit: BPF prog-id=127 op=LOAD Feb 9 19:38:46.107000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a04e0 items=0 ppid=2888 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:46.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653833383534333263646533663565653966376461373961326137 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.107000 audit: BPF prog-id=128 op=LOAD Feb 9 19:38:46.107000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0528 items=0 ppid=2888 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:46.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653833383534333263646533663565653966376461373961326137 Feb 9 19:38:46.107000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:38:46.108000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:46.108000 audit: BPF prog-id=129 op=LOAD Feb 9 19:38:46.108000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0938 items=0 ppid=2888 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653833383534333263646533663565653966376461373961326137 Feb 9 19:38:46.132948 env[1321]: time="2024-02-09T19:38:46.132811941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ftrg5,Uid:4de9d091-3289-4dfa-83ac-1fda29aae7f1,Namespace:calico-system,Attempt:0,} returns sandbox id \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\"" Feb 9 19:38:46.920805 kubelet[2407]: E0209 19:38:46.920748 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:48.273929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3683022196.mount: Deactivated successfully. Feb 9 19:38:48.918964 kubelet[2407]: E0209 19:38:48.918918 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:50.920550 kubelet[2407]: E0209 19:38:50.920504 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:51.193213 env[1321]: time="2024-02-09T19:38:51.193056436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:51.199322 env[1321]: time="2024-02-09T19:38:51.199261379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:51.203891 env[1321]: time="2024-02-09T19:38:51.203716710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:51.207630 env[1321]: time="2024-02-09T19:38:51.207577536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:51.208439 env[1321]: time="2024-02-09T19:38:51.208381942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:38:51.211948 env[1321]: time="2024-02-09T19:38:51.211913766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:38:51.227140 env[1321]: time="2024-02-09T19:38:51.227089171Z" level=info msg="CreateContainer within sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:38:51.268618 env[1321]: time="2024-02-09T19:38:51.268553059Z" level=info msg="CreateContainer within sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\"" Feb 9 19:38:51.271102 env[1321]: time="2024-02-09T19:38:51.269517965Z" level=info msg="StartContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\"" Feb 9 19:38:51.293597 systemd[1]: Started cri-containerd-b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8.scope. Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330128 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 19:38:51.330340 kernel: audit: type=1400 audit(1707507531.311:1045): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.344581 kernel: audit: type=1400 audit(1707507531.311:1046): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.370938 kernel: audit: type=1400 audit(1707507531.311:1047): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.371507 kernel: audit: type=1400 audit(1707507531.311:1048): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.384418 kernel: audit: type=1400 audit(1707507531.311:1049): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.401471 kernel: audit: type=1400 audit(1707507531.311:1050): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.418464 kernel: audit: type=1400 audit(1707507531.311:1051): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.418553 kernel: audit: type=1400 audit(1707507531.311:1052): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.458901 kernel: audit: type=1400 audit(1707507531.311:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.459064 kernel: audit: type=1400 audit(1707507531.311:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.311000 audit: BPF prog-id=130 op=LOAD Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2851 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:51.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230626137336534336139616462623639633133613764396364343735 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2851 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:51.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230626137336534336139616462623639633133613764396364343735 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.312000 audit: BPF prog-id=131 op=LOAD Feb 9 19:38:51.312000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003d0120 items=0 ppid=2851 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:51.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230626137336534336139616462623639633133613764396364343735 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.317000 audit: BPF prog-id=132 op=LOAD Feb 9 19:38:51.317000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003d0168 items=0 ppid=2851 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:51.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230626137336534336139616462623639633133613764396364343735 Feb 9 19:38:51.330000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:38:51.330000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:51.330000 audit: BPF prog-id=133 op=LOAD Feb 9 19:38:51.330000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003d0578 items=0 ppid=2851 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:51.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230626137336534336139616462623639633133613764396364343735 Feb 9 19:38:51.472766 env[1321]: time="2024-02-09T19:38:51.472702873Z" level=info msg="StartContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" returns successfully" Feb 9 19:38:52.030271 env[1321]: time="2024-02-09T19:38:52.030210332Z" level=info msg="StopContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" with timeout 300 (s)" Feb 9 19:38:52.030751 env[1321]: time="2024-02-09T19:38:52.030706036Z" level=info msg="Stop container \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" with signal terminated" Feb 9 19:38:52.056000 audit: BPF prog-id=130 op=UNLOAD Feb 9 19:38:52.056911 systemd[1]: cri-containerd-b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8.scope: Deactivated successfully. Feb 9 19:38:52.057932 kubelet[2407]: I0209 19:38:52.057586 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7584cf9f78-rjlnz" podStartSLOduration=2.852134839 podCreationTimestamp="2024-02-09 19:38:44 +0000 UTC" firstStartedPulling="2024-02-09 19:38:46.003804368 +0000 UTC m=+21.295745466" lastFinishedPulling="2024-02-09 19:38:51.208821145 +0000 UTC m=+26.500762243" observedRunningTime="2024-02-09 19:38:52.0548494 +0000 UTC m=+27.346790598" watchObservedRunningTime="2024-02-09 19:38:52.057151616 +0000 UTC m=+27.349092814" Feb 9 19:38:52.060000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:38:52.216637 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8-rootfs.mount: Deactivated successfully. Feb 9 19:38:52.919563 kubelet[2407]: E0209 19:38:52.919520 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:53.175673 env[1321]: time="2024-02-09T19:38:53.175376518Z" level=info msg="shim disconnected" id=b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8 Feb 9 19:38:53.175673 env[1321]: time="2024-02-09T19:38:53.175569419Z" level=warning msg="cleaning up after shim disconnected" id=b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8 namespace=k8s.io Feb 9 19:38:53.175673 env[1321]: time="2024-02-09T19:38:53.175585519Z" level=info msg="cleaning up dead shim" Feb 9 19:38:53.187406 env[1321]: time="2024-02-09T19:38:53.187107797Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:38:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2985 runtime=io.containerd.runc.v2\n" Feb 9 19:38:53.191349 env[1321]: time="2024-02-09T19:38:53.191303525Z" level=info msg="StopContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" returns successfully" Feb 9 19:38:53.192071 env[1321]: time="2024-02-09T19:38:53.191971529Z" level=info msg="StopPodSandbox for \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\"" Feb 9 19:38:53.192860 env[1321]: time="2024-02-09T19:38:53.192813435Z" level=info msg="Container to stop \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:38:53.197724 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557-shm.mount: Deactivated successfully. Feb 9 19:38:53.207000 audit: BPF prog-id=122 op=UNLOAD Feb 9 19:38:53.207880 systemd[1]: cri-containerd-269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557.scope: Deactivated successfully. Feb 9 19:38:53.211000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:38:53.231153 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557-rootfs.mount: Deactivated successfully. Feb 9 19:38:53.246803 env[1321]: time="2024-02-09T19:38:53.246736596Z" level=info msg="shim disconnected" id=269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557 Feb 9 19:38:53.247234 env[1321]: time="2024-02-09T19:38:53.247209400Z" level=warning msg="cleaning up after shim disconnected" id=269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557 namespace=k8s.io Feb 9 19:38:53.247327 env[1321]: time="2024-02-09T19:38:53.247303500Z" level=info msg="cleaning up dead shim" Feb 9 19:38:53.255747 env[1321]: time="2024-02-09T19:38:53.255687657Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:38:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3019 runtime=io.containerd.runc.v2\n" Feb 9 19:38:53.256104 env[1321]: time="2024-02-09T19:38:53.256072459Z" level=info msg="TearDown network for sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" successfully" Feb 9 19:38:53.256204 env[1321]: time="2024-02-09T19:38:53.256104659Z" level=info msg="StopPodSandbox for \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" returns successfully" Feb 9 19:38:53.278318 kubelet[2407]: I0209 19:38:53.278259 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:53.279020 kubelet[2407]: E0209 19:38:53.278997 2407 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="63b8e649-6af7-456c-9958-77261a95d63d" containerName="calico-typha" Feb 9 19:38:53.279214 kubelet[2407]: I0209 19:38:53.279199 2407 memory_manager.go:346] "RemoveStaleState removing state" podUID="63b8e649-6af7-456c-9958-77261a95d63d" containerName="calico-typha" Feb 9 19:38:53.287268 systemd[1]: Created slice kubepods-besteffort-podbac62e25_e00b_404d_8ede_979a7b863fda.slice. Feb 9 19:38:53.304000 audit[3032]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:53.304000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff034fc7a0 a2=0 a3=7fff034fc78c items=0 ppid=2587 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:53.305000 audit[3032]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:53.305000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff034fc7a0 a2=0 a3=31030 items=0 ppid=2587 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:53.313014 kubelet[2407]: E0209 19:38:53.312992 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.313164 kubelet[2407]: W0209 19:38:53.313148 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.313238 kubelet[2407]: E0209 19:38:53.313230 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.313329 kubelet[2407]: I0209 19:38:53.313323 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/63b8e649-6af7-456c-9958-77261a95d63d-typha-certs\") pod \"63b8e649-6af7-456c-9958-77261a95d63d\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " Feb 9 19:38:53.313655 kubelet[2407]: E0209 19:38:53.313636 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.313862 kubelet[2407]: W0209 19:38:53.313845 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.313979 kubelet[2407]: E0209 19:38:53.313966 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.314100 kubelet[2407]: I0209 19:38:53.314090 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8v2kv\" (UniqueName: \"kubernetes.io/projected/63b8e649-6af7-456c-9958-77261a95d63d-kube-api-access-8v2kv\") pod \"63b8e649-6af7-456c-9958-77261a95d63d\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " Feb 9 19:38:53.314470 kubelet[2407]: E0209 19:38:53.314454 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.314591 kubelet[2407]: W0209 19:38:53.314577 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.314696 kubelet[2407]: E0209 19:38:53.314686 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.314810 kubelet[2407]: I0209 19:38:53.314799 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/63b8e649-6af7-456c-9958-77261a95d63d-tigera-ca-bundle\") pod \"63b8e649-6af7-456c-9958-77261a95d63d\" (UID: \"63b8e649-6af7-456c-9958-77261a95d63d\") " Feb 9 19:38:53.315490 kubelet[2407]: E0209 19:38:53.315476 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.315603 kubelet[2407]: W0209 19:38:53.315588 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.315703 kubelet[2407]: E0209 19:38:53.315692 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.317000 audit[3036]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:53.317000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe9961f650 a2=0 a3=7ffe9961f63c items=0 ppid=2587 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:53.319231 kubelet[2407]: E0209 19:38:53.319216 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.319349 kubelet[2407]: W0209 19:38:53.319336 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.319446 kubelet[2407]: E0209 19:38:53.319435 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.321810 systemd[1]: var-lib-kubelet-pods-63b8e649\x2d6af7\x2d456c\x2d9958\x2d77261a95d63d-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 9 19:38:53.318000 audit[3036]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:38:53.318000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe9961f650 a2=0 a3=31030 items=0 ppid=2587 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:38:53.327561 kubelet[2407]: I0209 19:38:53.327522 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/63b8e649-6af7-456c-9958-77261a95d63d-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "63b8e649-6af7-456c-9958-77261a95d63d" (UID: "63b8e649-6af7-456c-9958-77261a95d63d"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:38:53.327790 kubelet[2407]: E0209 19:38:53.327779 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.327890 kubelet[2407]: W0209 19:38:53.327874 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.327979 kubelet[2407]: E0209 19:38:53.327968 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.328206 kubelet[2407]: W0209 19:38:53.328191 2407 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/63b8e649-6af7-456c-9958-77261a95d63d/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 19:38:53.328561 kubelet[2407]: I0209 19:38:53.328536 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/63b8e649-6af7-456c-9958-77261a95d63d-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "63b8e649-6af7-456c-9958-77261a95d63d" (UID: "63b8e649-6af7-456c-9958-77261a95d63d"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:38:53.329758 kubelet[2407]: I0209 19:38:53.329728 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/63b8e649-6af7-456c-9958-77261a95d63d-kube-api-access-8v2kv" (OuterVolumeSpecName: "kube-api-access-8v2kv") pod "63b8e649-6af7-456c-9958-77261a95d63d" (UID: "63b8e649-6af7-456c-9958-77261a95d63d"). InnerVolumeSpecName "kube-api-access-8v2kv". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:38:53.330709 systemd[1]: var-lib-kubelet-pods-63b8e649\x2d6af7\x2d456c\x2d9958\x2d77261a95d63d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8v2kv.mount: Deactivated successfully. Feb 9 19:38:53.330837 systemd[1]: var-lib-kubelet-pods-63b8e649\x2d6af7\x2d456c\x2d9958\x2d77261a95d63d-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 9 19:38:53.377332 kubelet[2407]: E0209 19:38:53.377290 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.377332 kubelet[2407]: W0209 19:38:53.377322 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.377696 kubelet[2407]: E0209 19:38:53.377350 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.377696 kubelet[2407]: E0209 19:38:53.377647 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.377696 kubelet[2407]: W0209 19:38:53.377662 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.377696 kubelet[2407]: E0209 19:38:53.377685 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.377946 kubelet[2407]: E0209 19:38:53.377895 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.377946 kubelet[2407]: W0209 19:38:53.377907 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.377946 kubelet[2407]: E0209 19:38:53.377925 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.378217 kubelet[2407]: E0209 19:38:53.378197 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.378217 kubelet[2407]: W0209 19:38:53.378213 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.378417 kubelet[2407]: E0209 19:38:53.378233 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.378494 kubelet[2407]: E0209 19:38:53.378453 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.378494 kubelet[2407]: W0209 19:38:53.378467 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.378494 kubelet[2407]: E0209 19:38:53.378485 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.378701 kubelet[2407]: E0209 19:38:53.378684 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.378765 kubelet[2407]: W0209 19:38:53.378702 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.378765 kubelet[2407]: E0209 19:38:53.378720 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.379041 kubelet[2407]: E0209 19:38:53.379016 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.379041 kubelet[2407]: W0209 19:38:53.379033 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.379243 kubelet[2407]: E0209 19:38:53.379053 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.379305 kubelet[2407]: E0209 19:38:53.379278 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.379305 kubelet[2407]: W0209 19:38:53.379290 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.379469 kubelet[2407]: E0209 19:38:53.379309 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.379594 kubelet[2407]: E0209 19:38:53.379572 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.379594 kubelet[2407]: W0209 19:38:53.379590 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.379725 kubelet[2407]: E0209 19:38:53.379612 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.416009 kubelet[2407]: E0209 19:38:53.415965 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.416009 kubelet[2407]: W0209 19:38:53.415990 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.416009 kubelet[2407]: E0209 19:38:53.416019 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.416341 kubelet[2407]: I0209 19:38:53.416062 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/bac62e25-e00b-404d-8ede-979a7b863fda-typha-certs\") pod \"calico-typha-568bf754d-mf5m8\" (UID: \"bac62e25-e00b-404d-8ede-979a7b863fda\") " pod="calico-system/calico-typha-568bf754d-mf5m8" Feb 9 19:38:53.416481 kubelet[2407]: E0209 19:38:53.416438 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.416481 kubelet[2407]: W0209 19:38:53.416457 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.416481 kubelet[2407]: E0209 19:38:53.416481 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.416675 kubelet[2407]: I0209 19:38:53.416510 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxp8t\" (UniqueName: \"kubernetes.io/projected/bac62e25-e00b-404d-8ede-979a7b863fda-kube-api-access-xxp8t\") pod \"calico-typha-568bf754d-mf5m8\" (UID: \"bac62e25-e00b-404d-8ede-979a7b863fda\") " pod="calico-system/calico-typha-568bf754d-mf5m8" Feb 9 19:38:53.416726 kubelet[2407]: E0209 19:38:53.416712 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.416726 kubelet[2407]: W0209 19:38:53.416722 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.416823 kubelet[2407]: E0209 19:38:53.416738 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.416933 kubelet[2407]: E0209 19:38:53.416918 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.416933 kubelet[2407]: W0209 19:38:53.416930 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.417063 kubelet[2407]: E0209 19:38:53.416946 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.417204 kubelet[2407]: E0209 19:38:53.417187 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.417290 kubelet[2407]: W0209 19:38:53.417199 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.417290 kubelet[2407]: E0209 19:38:53.417225 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.417866 kubelet[2407]: E0209 19:38:53.417843 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.417866 kubelet[2407]: W0209 19:38:53.417859 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.418021 kubelet[2407]: E0209 19:38:53.417876 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.418174 kubelet[2407]: E0209 19:38:53.418158 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.418249 kubelet[2407]: W0209 19:38:53.418170 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.418249 kubelet[2407]: E0209 19:38:53.418195 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.418249 kubelet[2407]: I0209 19:38:53.418225 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bac62e25-e00b-404d-8ede-979a7b863fda-tigera-ca-bundle\") pod \"calico-typha-568bf754d-mf5m8\" (UID: \"bac62e25-e00b-404d-8ede-979a7b863fda\") " pod="calico-system/calico-typha-568bf754d-mf5m8" Feb 9 19:38:53.418386 kubelet[2407]: I0209 19:38:53.418258 2407 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/63b8e649-6af7-456c-9958-77261a95d63d-typha-certs\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:53.418386 kubelet[2407]: I0209 19:38:53.418277 2407 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-8v2kv\" (UniqueName: \"kubernetes.io/projected/63b8e649-6af7-456c-9958-77261a95d63d-kube-api-access-8v2kv\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:53.418386 kubelet[2407]: I0209 19:38:53.418294 2407 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/63b8e649-6af7-456c-9958-77261a95d63d-tigera-ca-bundle\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:53.418559 kubelet[2407]: E0209 19:38:53.418547 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.418559 kubelet[2407]: W0209 19:38:53.418557 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.418661 kubelet[2407]: E0209 19:38:53.418581 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.418782 kubelet[2407]: E0209 19:38:53.418768 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.418782 kubelet[2407]: W0209 19:38:53.418780 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.418874 kubelet[2407]: E0209 19:38:53.418794 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.519498 kubelet[2407]: E0209 19:38:53.519335 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.519498 kubelet[2407]: W0209 19:38:53.519362 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.519498 kubelet[2407]: E0209 19:38:53.519420 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.520825 kubelet[2407]: E0209 19:38:53.520797 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.521008 kubelet[2407]: W0209 19:38:53.520991 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.521144 kubelet[2407]: E0209 19:38:53.521131 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.521542 kubelet[2407]: E0209 19:38:53.521526 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.521676 kubelet[2407]: W0209 19:38:53.521661 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.521773 kubelet[2407]: E0209 19:38:53.521762 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.522171 kubelet[2407]: E0209 19:38:53.522156 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.522279 kubelet[2407]: W0209 19:38:53.522264 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.522384 kubelet[2407]: E0209 19:38:53.522373 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.522734 kubelet[2407]: E0209 19:38:53.522720 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.522851 kubelet[2407]: W0209 19:38:53.522837 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.522941 kubelet[2407]: E0209 19:38:53.522931 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.523243 kubelet[2407]: E0209 19:38:53.523229 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.523359 kubelet[2407]: W0209 19:38:53.523345 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.523573 kubelet[2407]: E0209 19:38:53.523539 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.524002 kubelet[2407]: E0209 19:38:53.523987 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.524120 kubelet[2407]: W0209 19:38:53.524105 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.524223 kubelet[2407]: E0209 19:38:53.524212 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.526246 kubelet[2407]: E0209 19:38:53.526214 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.526246 kubelet[2407]: W0209 19:38:53.526243 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.526506 kubelet[2407]: E0209 19:38:53.526265 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.526582 kubelet[2407]: E0209 19:38:53.526508 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.526582 kubelet[2407]: W0209 19:38:53.526521 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.526582 kubelet[2407]: E0209 19:38:53.526542 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.526781 kubelet[2407]: E0209 19:38:53.526741 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.526781 kubelet[2407]: W0209 19:38:53.526752 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.526781 kubelet[2407]: E0209 19:38:53.526770 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.528354 kubelet[2407]: E0209 19:38:53.528330 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.528354 kubelet[2407]: W0209 19:38:53.528351 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.528623 kubelet[2407]: E0209 19:38:53.528368 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.534007 kubelet[2407]: E0209 19:38:53.533982 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.534135 kubelet[2407]: W0209 19:38:53.534121 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.534235 kubelet[2407]: E0209 19:38:53.534226 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.534559 kubelet[2407]: E0209 19:38:53.534547 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.534681 kubelet[2407]: W0209 19:38:53.534667 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.534788 kubelet[2407]: E0209 19:38:53.534778 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.535070 kubelet[2407]: E0209 19:38:53.535058 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.535171 kubelet[2407]: W0209 19:38:53.535159 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.535271 kubelet[2407]: E0209 19:38:53.535259 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.535642 kubelet[2407]: E0209 19:38:53.535611 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.535770 kubelet[2407]: W0209 19:38:53.535757 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.535886 kubelet[2407]: E0209 19:38:53.535864 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.537233 kubelet[2407]: E0209 19:38:53.536983 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.537233 kubelet[2407]: W0209 19:38:53.537005 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.537233 kubelet[2407]: E0209 19:38:53.537073 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.537612 kubelet[2407]: E0209 19:38:53.537340 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.537612 kubelet[2407]: W0209 19:38:53.537350 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.537612 kubelet[2407]: E0209 19:38:53.537367 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.547250 kubelet[2407]: E0209 19:38:53.547225 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:53.547250 kubelet[2407]: W0209 19:38:53.547243 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:53.547457 kubelet[2407]: E0209 19:38:53.547268 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:53.592146 env[1321]: time="2024-02-09T19:38:53.592097813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-568bf754d-mf5m8,Uid:bac62e25-e00b-404d-8ede-979a7b863fda,Namespace:calico-system,Attempt:0,}" Feb 9 19:38:53.677413 env[1321]: time="2024-02-09T19:38:53.677287284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:53.677710 env[1321]: time="2024-02-09T19:38:53.677668086Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:53.677851 env[1321]: time="2024-02-09T19:38:53.677825987Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:53.678165 env[1321]: time="2024-02-09T19:38:53.678122589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ec19f6420e3bc256e543af6d4c1356f023a979cf85b3bc225eb5bec3e12af2e pid=3091 runtime=io.containerd.runc.v2 Feb 9 19:38:53.711140 systemd[1]: Started cri-containerd-0ec19f6420e3bc256e543af6d4c1356f023a979cf85b3bc225eb5bec3e12af2e.scope. Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.742000 audit: BPF prog-id=134 op=LOAD Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065633139663634323065336263323536653534336166366434633133 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065633139663634323065336263323536653534336166366434633133 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit: BPF prog-id=135 op=LOAD Feb 9 19:38:53.743000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000219b40 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065633139663634323065336263323536653534336166366434633133 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit: BPF prog-id=136 op=LOAD Feb 9 19:38:53.743000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219b88 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065633139663634323065336263323536653534336166366434633133 Feb 9 19:38:53.743000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:38:53.743000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.743000 audit: BPF prog-id=137 op=LOAD Feb 9 19:38:53.743000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219f98 items=0 ppid=3091 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065633139663634323065336263323536653534336166366434633133 Feb 9 19:38:53.792736 env[1321]: time="2024-02-09T19:38:53.792594357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-568bf754d-mf5m8,Uid:bac62e25-e00b-404d-8ede-979a7b863fda,Namespace:calico-system,Attempt:0,} returns sandbox id \"0ec19f6420e3bc256e543af6d4c1356f023a979cf85b3bc225eb5bec3e12af2e\"" Feb 9 19:38:53.807621 env[1321]: time="2024-02-09T19:38:53.807571358Z" level=info msg="CreateContainer within sandbox \"0ec19f6420e3bc256e543af6d4c1356f023a979cf85b3bc225eb5bec3e12af2e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:38:53.858979 env[1321]: time="2024-02-09T19:38:53.858913102Z" level=info msg="CreateContainer within sandbox \"0ec19f6420e3bc256e543af6d4c1356f023a979cf85b3bc225eb5bec3e12af2e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d1dc979e2555951d61288f6bcc799f57a61eda334bd1bf39750da61c78de7978\"" Feb 9 19:38:53.859749 env[1321]: time="2024-02-09T19:38:53.859701407Z" level=info msg="StartContainer for \"d1dc979e2555951d61288f6bcc799f57a61eda334bd1bf39750da61c78de7978\"" Feb 9 19:38:53.885611 systemd[1]: Started cri-containerd-d1dc979e2555951d61288f6bcc799f57a61eda334bd1bf39750da61c78de7978.scope. Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.924000 audit: BPF prog-id=138 op=LOAD Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3091 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646339373965323535353935316436313238386636626363373939 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3091 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646339373965323535353935316436313238386636626363373939 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit: BPF prog-id=139 op=LOAD Feb 9 19:38:53.925000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001dd3d0 items=0 ppid=3091 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646339373965323535353935316436313238386636626363373939 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit: BPF prog-id=140 op=LOAD Feb 9 19:38:53.925000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001dd418 items=0 ppid=3091 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646339373965323535353935316436313238386636626363373939 Feb 9 19:38:53.925000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:38:53.925000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:53.925000 audit: BPF prog-id=141 op=LOAD Feb 9 19:38:53.925000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001dd828 items=0 ppid=3091 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:53.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431646339373965323535353935316436313238386636626363373939 Feb 9 19:38:53.970893 env[1321]: time="2024-02-09T19:38:53.970823452Z" level=info msg="StartContainer for \"d1dc979e2555951d61288f6bcc799f57a61eda334bd1bf39750da61c78de7978\" returns successfully" Feb 9 19:38:54.036549 kubelet[2407]: I0209 19:38:54.034828 2407 scope.go:115] "RemoveContainer" containerID="b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8" Feb 9 19:38:54.040666 systemd[1]: Removed slice kubepods-besteffort-pod63b8e649_6af7_456c_9958_77261a95d63d.slice. Feb 9 19:38:54.048611 env[1321]: time="2024-02-09T19:38:54.048384267Z" level=info msg="RemoveContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\"" Feb 9 19:38:54.073467 env[1321]: time="2024-02-09T19:38:54.073418533Z" level=info msg="RemoveContainer for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" returns successfully" Feb 9 19:38:54.073946 kubelet[2407]: I0209 19:38:54.073904 2407 scope.go:115] "RemoveContainer" containerID="b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8" Feb 9 19:38:54.074603 env[1321]: time="2024-02-09T19:38:54.074494740Z" level=error msg="ContainerStatus for \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\": not found" Feb 9 19:38:54.074969 kubelet[2407]: E0209 19:38:54.074955 2407 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\": not found" containerID="b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8" Feb 9 19:38:54.075170 kubelet[2407]: I0209 19:38:54.075156 2407 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8} err="failed to get container status \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\": rpc error: code = NotFound desc = an error occurred when try to find container \"b0ba73e43a9adbb69c13a7d9cd475e15d252e6f97e2c8036aa3b26a70157abc8\": not found" Feb 9 19:38:54.083833 kubelet[2407]: E0209 19:38:54.083796 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.083833 kubelet[2407]: W0209 19:38:54.083828 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.084146 kubelet[2407]: E0209 19:38:54.083857 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.085375 kubelet[2407]: E0209 19:38:54.084914 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.085375 kubelet[2407]: W0209 19:38:54.084935 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.085375 kubelet[2407]: E0209 19:38:54.084960 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.085375 kubelet[2407]: E0209 19:38:54.085203 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.085375 kubelet[2407]: W0209 19:38:54.085215 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.085375 kubelet[2407]: E0209 19:38:54.085231 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.086174 kubelet[2407]: E0209 19:38:54.085823 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.086174 kubelet[2407]: W0209 19:38:54.085838 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.086174 kubelet[2407]: E0209 19:38:54.085856 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.086174 kubelet[2407]: E0209 19:38:54.086061 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.086174 kubelet[2407]: W0209 19:38:54.086073 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.086174 kubelet[2407]: E0209 19:38:54.086089 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.086858 kubelet[2407]: E0209 19:38:54.086578 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.086858 kubelet[2407]: W0209 19:38:54.086591 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.086858 kubelet[2407]: E0209 19:38:54.086608 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.087179 kubelet[2407]: E0209 19:38:54.087060 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.087179 kubelet[2407]: W0209 19:38:54.087074 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.087179 kubelet[2407]: E0209 19:38:54.087090 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.087534 kubelet[2407]: E0209 19:38:54.087520 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.087641 kubelet[2407]: W0209 19:38:54.087628 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.087731 kubelet[2407]: E0209 19:38:54.087720 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.087993 kubelet[2407]: E0209 19:38:54.087981 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.088083 kubelet[2407]: W0209 19:38:54.088071 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.088159 kubelet[2407]: E0209 19:38:54.088150 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.088463 kubelet[2407]: E0209 19:38:54.088449 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.088571 kubelet[2407]: W0209 19:38:54.088556 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.088659 kubelet[2407]: E0209 19:38:54.088650 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.088923 kubelet[2407]: E0209 19:38:54.088910 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.089019 kubelet[2407]: W0209 19:38:54.089006 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.089096 kubelet[2407]: E0209 19:38:54.089087 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.089357 kubelet[2407]: E0209 19:38:54.089346 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.089497 kubelet[2407]: W0209 19:38:54.089486 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.089584 kubelet[2407]: E0209 19:38:54.089573 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.110998 kubelet[2407]: I0209 19:38:54.110961 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-568bf754d-mf5m8" podStartSLOduration=9.11091538 podCreationTimestamp="2024-02-09 19:38:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:54.110766979 +0000 UTC m=+29.402708077" watchObservedRunningTime="2024-02-09 19:38:54.11091538 +0000 UTC m=+29.402856478" Feb 9 19:38:54.127933 kubelet[2407]: E0209 19:38:54.127897 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.128177 kubelet[2407]: W0209 19:38:54.128157 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.128288 kubelet[2407]: E0209 19:38:54.128269 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.128736 kubelet[2407]: E0209 19:38:54.128710 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.128736 kubelet[2407]: W0209 19:38:54.128731 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.128906 kubelet[2407]: E0209 19:38:54.128753 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.129050 kubelet[2407]: E0209 19:38:54.129011 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.129050 kubelet[2407]: W0209 19:38:54.129028 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.129205 kubelet[2407]: E0209 19:38:54.129055 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.129330 kubelet[2407]: E0209 19:38:54.129315 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.129387 kubelet[2407]: W0209 19:38:54.129331 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.129387 kubelet[2407]: E0209 19:38:54.129358 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.129622 kubelet[2407]: E0209 19:38:54.129604 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.129697 kubelet[2407]: W0209 19:38:54.129626 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.129697 kubelet[2407]: E0209 19:38:54.129646 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.129841 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.130736 kubelet[2407]: W0209 19:38:54.129854 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.129880 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.130112 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.130736 kubelet[2407]: W0209 19:38:54.130123 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.130213 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.130628 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.130736 kubelet[2407]: W0209 19:38:54.130640 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.130736 kubelet[2407]: E0209 19:38:54.130742 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.131196 kubelet[2407]: E0209 19:38:54.130879 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.131196 kubelet[2407]: W0209 19:38:54.130888 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.131196 kubelet[2407]: E0209 19:38:54.130979 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.131196 kubelet[2407]: E0209 19:38:54.131098 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.131196 kubelet[2407]: W0209 19:38:54.131107 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.131196 kubelet[2407]: E0209 19:38:54.131124 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.131507 kubelet[2407]: E0209 19:38:54.131331 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.131507 kubelet[2407]: W0209 19:38:54.131340 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.131507 kubelet[2407]: E0209 19:38:54.131362 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.131639 kubelet[2407]: E0209 19:38:54.131564 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.131639 kubelet[2407]: W0209 19:38:54.131573 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.131639 kubelet[2407]: E0209 19:38:54.131592 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.132141 kubelet[2407]: E0209 19:38:54.131826 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.132141 kubelet[2407]: W0209 19:38:54.131838 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.132141 kubelet[2407]: E0209 19:38:54.131858 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.132550 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.134449 kubelet[2407]: W0209 19:38:54.132565 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.132645 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.132797 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.134449 kubelet[2407]: W0209 19:38:54.132805 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.132820 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.132988 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.134449 kubelet[2407]: W0209 19:38:54.132997 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.133011 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.134449 kubelet[2407]: E0209 19:38:54.133190 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.134921 kubelet[2407]: W0209 19:38:54.133198 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.134921 kubelet[2407]: E0209 19:38:54.133211 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.134921 kubelet[2407]: E0209 19:38:54.133636 2407 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:38:54.134921 kubelet[2407]: W0209 19:38:54.133648 2407 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:38:54.134921 kubelet[2407]: E0209 19:38:54.133663 2407 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:38:54.921436 kubelet[2407]: E0209 19:38:54.920096 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:54.931060 kubelet[2407]: I0209 19:38:54.930997 2407 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=63b8e649-6af7-456c-9958-77261a95d63d path="/var/lib/kubelet/pods/63b8e649-6af7-456c-9958-77261a95d63d/volumes" Feb 9 19:38:56.249548 env[1321]: time="2024-02-09T19:38:56.249489744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:56.263386 env[1321]: time="2024-02-09T19:38:56.263332433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:56.271197 env[1321]: time="2024-02-09T19:38:56.271147783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:56.280006 env[1321]: time="2024-02-09T19:38:56.279948039Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:56.280870 env[1321]: time="2024-02-09T19:38:56.280827445Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:38:56.285742 env[1321]: time="2024-02-09T19:38:56.285693376Z" level=info msg="CreateContainer within sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:38:56.313128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2315847554.mount: Deactivated successfully. Feb 9 19:38:56.325705 env[1321]: time="2024-02-09T19:38:56.325618631Z" level=info msg="CreateContainer within sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\"" Feb 9 19:38:56.328062 env[1321]: time="2024-02-09T19:38:56.326499937Z" level=info msg="StartContainer for \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\"" Feb 9 19:38:56.357115 systemd[1]: Started cri-containerd-bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9.scope. Feb 9 19:38:56.391562 kernel: kauditd_printk_skb: 177 callbacks suppressed Feb 9 19:38:56.391768 kernel: audit: type=1400 audit(1707507536.372:1107): avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2888 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:56.416425 kernel: audit: type=1300 audit(1707507536.372:1107): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2888 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:56.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262386239666432326230616439313261656537323065653962333032 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.436706 systemd[1]: cri-containerd-bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9.scope: Deactivated successfully. Feb 9 19:38:56.438465 env[1321]: time="2024-02-09T19:38:56.438385953Z" level=info msg="StartContainer for \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\" returns successfully" Feb 9 19:38:56.449651 kernel: audit: type=1327 audit(1707507536.372:1107): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262386239666432326230616439313261656537323065653962333032 Feb 9 19:38:56.449795 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.464434 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.464565 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.493507 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.508769 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.537720 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.537887 kernel: audit: type=1400 audit(1707507536.372:1108): avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.372000 audit: BPF prog-id=142 op=LOAD Feb 9 19:38:56.372000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000392490 items=0 ppid=2888 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:56.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262386239666432326230616439313261656537323065653962333032 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.377000 audit: BPF prog-id=143 op=LOAD Feb 9 19:38:56.377000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003924d8 items=0 ppid=2888 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:56.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262386239666432326230616439313261656537323065653962333032 Feb 9 19:38:56.391000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:38:56.391000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { perfmon } for pid=3202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit[3202]: AVC avc: denied { bpf } for pid=3202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:56.391000 audit: BPF prog-id=144 op=LOAD Feb 9 19:38:56.391000 audit[3202]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000392568 items=0 ppid=2888 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:56.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262386239666432326230616439313261656537323065653962333032 Feb 9 19:38:56.450000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:38:56.675802 env[1321]: time="2024-02-09T19:38:56.675741972Z" level=info msg="shim disconnected" id=bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9 Feb 9 19:38:56.675802 env[1321]: time="2024-02-09T19:38:56.675797772Z" level=warning msg="cleaning up after shim disconnected" id=bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9 namespace=k8s.io Feb 9 19:38:56.675802 env[1321]: time="2024-02-09T19:38:56.675810472Z" level=info msg="cleaning up dead shim" Feb 9 19:38:56.685348 env[1321]: time="2024-02-09T19:38:56.685281933Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:38:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3242 runtime=io.containerd.runc.v2\n" Feb 9 19:38:56.918894 kubelet[2407]: E0209 19:38:56.918842 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:57.057940 env[1321]: time="2024-02-09T19:38:57.057885012Z" level=info msg="StopPodSandbox for \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\"" Feb 9 19:38:57.058322 env[1321]: time="2024-02-09T19:38:57.058267614Z" level=info msg="Container to stop \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:38:57.071000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:38:57.071860 systemd[1]: cri-containerd-22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453.scope: Deactivated successfully. Feb 9 19:38:57.075000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:38:57.107672 env[1321]: time="2024-02-09T19:38:57.107597525Z" level=info msg="shim disconnected" id=22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453 Feb 9 19:38:57.107672 env[1321]: time="2024-02-09T19:38:57.107663725Z" level=warning msg="cleaning up after shim disconnected" id=22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453 namespace=k8s.io Feb 9 19:38:57.107672 env[1321]: time="2024-02-09T19:38:57.107676826Z" level=info msg="cleaning up dead shim" Feb 9 19:38:57.117128 env[1321]: time="2024-02-09T19:38:57.117066585Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:38:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3274 runtime=io.containerd.runc.v2\n" Feb 9 19:38:57.117560 env[1321]: time="2024-02-09T19:38:57.117525188Z" level=info msg="TearDown network for sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" successfully" Feb 9 19:38:57.117675 env[1321]: time="2024-02-09T19:38:57.117558288Z" level=info msg="StopPodSandbox for \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" returns successfully" Feb 9 19:38:57.261130 kubelet[2407]: I0209 19:38:57.260991 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-flexvol-driver-host\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.261130 kubelet[2407]: I0209 19:38:57.261065 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-policysync\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.261130 kubelet[2407]: I0209 19:38:57.261096 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-bin-dir\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.261583 kubelet[2407]: I0209 19:38:57.261545 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.261783 kubelet[2407]: I0209 19:38:57.261748 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-policysync" (OuterVolumeSpecName: "policysync") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.262104 kubelet[2407]: I0209 19:38:57.262076 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4de9d091-3289-4dfa-83ac-1fda29aae7f1-tigera-ca-bundle\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262209 kubelet[2407]: I0209 19:38:57.262131 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-net-dir\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262209 kubelet[2407]: I0209 19:38:57.262167 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-lib-calico\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262209 kubelet[2407]: I0209 19:38:57.262199 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-xtables-lock\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262420 kubelet[2407]: I0209 19:38:57.262240 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4de9d091-3289-4dfa-83ac-1fda29aae7f1-node-certs\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262420 kubelet[2407]: I0209 19:38:57.262281 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-czqh6\" (UniqueName: \"kubernetes.io/projected/4de9d091-3289-4dfa-83ac-1fda29aae7f1-kube-api-access-czqh6\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262420 kubelet[2407]: I0209 19:38:57.262317 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-run-calico\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262420 kubelet[2407]: I0209 19:38:57.262348 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-lib-modules\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262420 kubelet[2407]: I0209 19:38:57.262383 2407 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-log-dir\") pod \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\" (UID: \"4de9d091-3289-4dfa-83ac-1fda29aae7f1\") " Feb 9 19:38:57.262705 kubelet[2407]: I0209 19:38:57.262467 2407 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-flexvol-driver-host\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.262705 kubelet[2407]: I0209 19:38:57.262490 2407 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-policysync\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.262705 kubelet[2407]: I0209 19:38:57.262521 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.262705 kubelet[2407]: I0209 19:38:57.262077 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.262705 kubelet[2407]: I0209 19:38:57.262558 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.262975 kubelet[2407]: I0209 19:38:57.262588 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.262975 kubelet[2407]: I0209 19:38:57.262615 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.263363 kubelet[2407]: W0209 19:38:57.263317 2407 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/4de9d091-3289-4dfa-83ac-1fda29aae7f1/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 19:38:57.263884 kubelet[2407]: I0209 19:38:57.263856 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/4de9d091-3289-4dfa-83ac-1fda29aae7f1-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:38:57.264072 kubelet[2407]: I0209 19:38:57.264049 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.264237 kubelet[2407]: I0209 19:38:57.264216 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:38:57.267360 kubelet[2407]: I0209 19:38:57.267326 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/4de9d091-3289-4dfa-83ac-1fda29aae7f1-node-certs" (OuterVolumeSpecName: "node-certs") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:38:57.268112 kubelet[2407]: I0209 19:38:57.268084 2407 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/4de9d091-3289-4dfa-83ac-1fda29aae7f1-kube-api-access-czqh6" (OuterVolumeSpecName: "kube-api-access-czqh6") pod "4de9d091-3289-4dfa-83ac-1fda29aae7f1" (UID: "4de9d091-3289-4dfa-83ac-1fda29aae7f1"). InnerVolumeSpecName "kube-api-access-czqh6". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:38:57.308006 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9-rootfs.mount: Deactivated successfully. Feb 9 19:38:57.308134 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453-rootfs.mount: Deactivated successfully. Feb 9 19:38:57.308215 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453-shm.mount: Deactivated successfully. Feb 9 19:38:57.308401 systemd[1]: var-lib-kubelet-pods-4de9d091\x2d3289\x2d4dfa\x2d83ac\x2d1fda29aae7f1-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dczqh6.mount: Deactivated successfully. Feb 9 19:38:57.308490 systemd[1]: var-lib-kubelet-pods-4de9d091\x2d3289\x2d4dfa\x2d83ac\x2d1fda29aae7f1-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 9 19:38:57.362803 kubelet[2407]: I0209 19:38:57.362751 2407 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-lib-calico\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.362803 kubelet[2407]: I0209 19:38:57.362790 2407 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-xtables-lock\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.362803 kubelet[2407]: I0209 19:38:57.362805 2407 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4de9d091-3289-4dfa-83ac-1fda29aae7f1-node-certs\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.362803 kubelet[2407]: I0209 19:38:57.362818 2407 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-czqh6\" (UniqueName: \"kubernetes.io/projected/4de9d091-3289-4dfa-83ac-1fda29aae7f1-kube-api-access-czqh6\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362832 2407 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-var-run-calico\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362844 2407 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-lib-modules\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362856 2407 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-log-dir\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362870 2407 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-bin-dir\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362882 2407 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4de9d091-3289-4dfa-83ac-1fda29aae7f1-tigera-ca-bundle\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:57.363098 kubelet[2407]: I0209 19:38:57.362893 2407 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4de9d091-3289-4dfa-83ac-1fda29aae7f1-cni-net-dir\") on node \"ci-3510.3.2-a-e84cdbff2f\" DevicePath \"\"" Feb 9 19:38:58.061176 kubelet[2407]: I0209 19:38:58.061126 2407 scope.go:115] "RemoveContainer" containerID="bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9" Feb 9 19:38:58.065519 systemd[1]: Removed slice kubepods-besteffort-pod4de9d091_3289_4dfa_83ac_1fda29aae7f1.slice. Feb 9 19:38:58.069294 env[1321]: time="2024-02-09T19:38:58.069238480Z" level=info msg="RemoveContainer for \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\"" Feb 9 19:38:58.081710 env[1321]: time="2024-02-09T19:38:58.080591351Z" level=info msg="RemoveContainer for \"bb8b9fd22b0ad912aee720ee9b302673f3cc09ef40552943bff9fef5e64112c9\" returns successfully" Feb 9 19:38:58.109475 kubelet[2407]: I0209 19:38:58.109419 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:38:58.109672 kubelet[2407]: E0209 19:38:58.109546 2407 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="4de9d091-3289-4dfa-83ac-1fda29aae7f1" containerName="flexvol-driver" Feb 9 19:38:58.109672 kubelet[2407]: I0209 19:38:58.109596 2407 memory_manager.go:346] "RemoveStaleState removing state" podUID="4de9d091-3289-4dfa-83ac-1fda29aae7f1" containerName="flexvol-driver" Feb 9 19:38:58.132064 systemd[1]: Created slice kubepods-besteffort-pod9905f9c4_4674_4072_93bc_455b84eb9930.slice. Feb 9 19:38:58.169872 kubelet[2407]: I0209 19:38:58.169825 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vds7g\" (UniqueName: \"kubernetes.io/projected/9905f9c4-4674-4072-93bc-455b84eb9930-kube-api-access-vds7g\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.169872 kubelet[2407]: I0209 19:38:58.169879 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9905f9c4-4674-4072-93bc-455b84eb9930-tigera-ca-bundle\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170160 kubelet[2407]: I0209 19:38:58.169906 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-flexvol-driver-host\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170160 kubelet[2407]: I0209 19:38:58.169976 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-policysync\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170160 kubelet[2407]: I0209 19:38:58.170007 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-var-run-calico\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170160 kubelet[2407]: I0209 19:38:58.170032 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-cni-net-dir\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170160 kubelet[2407]: I0209 19:38:58.170058 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9905f9c4-4674-4072-93bc-455b84eb9930-node-certs\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170377 kubelet[2407]: I0209 19:38:58.170083 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-cni-bin-dir\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170377 kubelet[2407]: I0209 19:38:58.170122 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-xtables-lock\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170377 kubelet[2407]: I0209 19:38:58.170153 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-var-lib-calico\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170377 kubelet[2407]: I0209 19:38:58.170184 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-lib-modules\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.170377 kubelet[2407]: I0209 19:38:58.170213 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9905f9c4-4674-4072-93bc-455b84eb9930-cni-log-dir\") pod \"calico-node-gfztf\" (UID: \"9905f9c4-4674-4072-93bc-455b84eb9930\") " pod="calico-system/calico-node-gfztf" Feb 9 19:38:58.436863 env[1321]: time="2024-02-09T19:38:58.436807763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gfztf,Uid:9905f9c4-4674-4072-93bc-455b84eb9930,Namespace:calico-system,Attempt:0,}" Feb 9 19:38:58.468466 env[1321]: time="2024-02-09T19:38:58.468373359Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:58.468466 env[1321]: time="2024-02-09T19:38:58.468437059Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:58.468850 env[1321]: time="2024-02-09T19:38:58.468451359Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:58.468850 env[1321]: time="2024-02-09T19:38:58.468702261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80 pid=3303 runtime=io.containerd.runc.v2 Feb 9 19:38:58.494412 systemd[1]: run-containerd-runc-k8s.io-2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80-runc.0KcC5g.mount: Deactivated successfully. Feb 9 19:38:58.498544 systemd[1]: Started cri-containerd-2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80.scope. Feb 9 19:38:58.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.513000 audit: BPF prog-id=145 op=LOAD Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3303 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303562393662626661623464653739396234366131656436366538 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3303 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303562393662626661623464653739396234366131656436366538 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.514000 audit: BPF prog-id=146 op=LOAD Feb 9 19:38:58.514000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028f220 items=0 ppid=3303 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303562393662626661623464653739396234366131656436366538 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.515000 audit: BPF prog-id=147 op=LOAD Feb 9 19:38:58.515000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028f268 items=0 ppid=3303 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303562393662626661623464653739396234366131656436366538 Feb 9 19:38:58.516000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:38:58.516000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.516000 audit: BPF prog-id=148 op=LOAD Feb 9 19:38:58.516000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028f678 items=0 ppid=3303 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303562393662626661623464653739396234366131656436366538 Feb 9 19:38:58.531477 env[1321]: time="2024-02-09T19:38:58.531431050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gfztf,Uid:9905f9c4-4674-4072-93bc-455b84eb9930,Namespace:calico-system,Attempt:0,} returns sandbox id \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\"" Feb 9 19:38:58.535748 env[1321]: time="2024-02-09T19:38:58.535704277Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:38:58.571411 env[1321]: time="2024-02-09T19:38:58.571347098Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a\"" Feb 9 19:38:58.572144 env[1321]: time="2024-02-09T19:38:58.572055203Z" level=info msg="StartContainer for \"02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a\"" Feb 9 19:38:58.593506 systemd[1]: Started cri-containerd-02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a.scope. Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3303 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373233656131323564326336323437663539316166623563383736 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.612000 audit: BPF prog-id=149 op=LOAD Feb 9 19:38:58.612000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4ae0 items=0 ppid=3303 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373233656131323564326336323437663539316166623563383736 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit: BPF prog-id=150 op=LOAD Feb 9 19:38:58.613000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4b28 items=0 ppid=3303 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373233656131323564326336323437663539316166623563383736 Feb 9 19:38:58.613000 audit: BPF prog-id=150 op=UNLOAD Feb 9 19:38:58.613000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { perfmon } for pid=3344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit[3344]: AVC avc: denied { bpf } for pid=3344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:58.613000 audit: BPF prog-id=151 op=LOAD Feb 9 19:38:58.613000 audit[3344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4bb8 items=0 ppid=3303 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:58.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373233656131323564326336323437663539316166623563383736 Feb 9 19:38:58.641626 env[1321]: time="2024-02-09T19:38:58.641570434Z" level=info msg="StartContainer for \"02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a\" returns successfully" Feb 9 19:38:58.662262 systemd[1]: cri-containerd-02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a.scope: Deactivated successfully. Feb 9 19:38:58.665000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:38:58.767456 env[1321]: time="2024-02-09T19:38:58.767292315Z" level=info msg="shim disconnected" id=02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a Feb 9 19:38:58.767456 env[1321]: time="2024-02-09T19:38:58.767362716Z" level=warning msg="cleaning up after shim disconnected" id=02723ea125d2c6247f591afb5c8765714f6b1bf9a0014fac2a8361e7a9d5bc3a namespace=k8s.io Feb 9 19:38:58.767456 env[1321]: time="2024-02-09T19:38:58.767375016Z" level=info msg="cleaning up dead shim" Feb 9 19:38:58.780258 env[1321]: time="2024-02-09T19:38:58.780200995Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:38:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3382 runtime=io.containerd.runc.v2\n" Feb 9 19:38:58.920126 kubelet[2407]: E0209 19:38:58.919747 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:38:58.922087 kubelet[2407]: I0209 19:38:58.922058 2407 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=4de9d091-3289-4dfa-83ac-1fda29aae7f1 path="/var/lib/kubelet/pods/4de9d091-3289-4dfa-83ac-1fda29aae7f1/volumes" Feb 9 19:38:59.066460 env[1321]: time="2024-02-09T19:38:59.066014364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:39:00.919136 kubelet[2407]: E0209 19:39:00.918600 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:01.095475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3752081948.mount: Deactivated successfully. Feb 9 19:39:02.918790 kubelet[2407]: E0209 19:39:02.918748 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:04.921341 kubelet[2407]: E0209 19:39:04.921292 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:06.370846 env[1321]: time="2024-02-09T19:39:06.370796323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:06.376937 env[1321]: time="2024-02-09T19:39:06.376893057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:06.379706 env[1321]: time="2024-02-09T19:39:06.379665773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:06.383165 env[1321]: time="2024-02-09T19:39:06.383121592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:06.383896 env[1321]: time="2024-02-09T19:39:06.383859696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:39:06.388028 env[1321]: time="2024-02-09T19:39:06.387804118Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:39:06.432214 env[1321]: time="2024-02-09T19:39:06.432148265Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77\"" Feb 9 19:39:06.435412 env[1321]: time="2024-02-09T19:39:06.433180370Z" level=info msg="StartContainer for \"26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77\"" Feb 9 19:39:06.463760 systemd[1]: run-containerd-runc-k8s.io-26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77-runc.TOmsYL.mount: Deactivated successfully. Feb 9 19:39:06.470069 systemd[1]: Started cri-containerd-26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77.scope. Feb 9 19:39:06.494431 kernel: kauditd_printk_skb: 137 callbacks suppressed Feb 9 19:39:06.494570 kernel: audit: type=1400 audit(1707507546.486:1141): avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.486000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.486000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3303 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:06.525224 kernel: audit: type=1300 audit(1707507546.486:1141): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3303 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:06.525347 kernel: audit: type=1327 audit(1707507546.486:1141): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613862346632666639313761613631653632636139303533643935 Feb 9 19:39:06.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613862346632666639313761613631653632636139303533643935 Feb 9 19:39:06.545043 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.569700 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.570171 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.600554 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.606539 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.607695 env[1321]: time="2024-02-09T19:39:06.607654541Z" level=info msg="StartContainer for \"26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77\" returns successfully" Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.645215 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.645359 kernel: audit: type=1400 audit(1707507546.494:1142): avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.494000 audit: BPF prog-id=152 op=LOAD Feb 9 19:39:06.494000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003631a0 items=0 ppid=3303 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:06.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613862346632666639313761613631653632636139303533643935 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.504000 audit: BPF prog-id=153 op=LOAD Feb 9 19:39:06.504000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003631e8 items=0 ppid=3303 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:06.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613862346632666639313761613631653632636139303533643935 Feb 9 19:39:06.544000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:39:06.544000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:06.544000 audit: BPF prog-id=154 op=LOAD Feb 9 19:39:06.544000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000363278 items=0 ppid=3303 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:06.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613862346632666639313761613631653632636139303533643935 Feb 9 19:39:06.920013 kubelet[2407]: E0209 19:39:06.919876 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:08.305227 env[1321]: time="2024-02-09T19:39:08.305136973Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:39:08.307983 systemd[1]: cri-containerd-26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77.scope: Deactivated successfully. Feb 9 19:39:08.312000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:39:08.333124 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77-rootfs.mount: Deactivated successfully. Feb 9 19:39:08.346229 kubelet[2407]: I0209 19:39:08.346078 2407 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.368764 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.384073 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.384306 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.455579 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb-config-volume\") pod \"coredns-5d78c9869d-zgbp8\" (UID: \"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb\") " pod="kube-system/coredns-5d78c9869d-zgbp8" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.455625 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9kkjt\" (UniqueName: \"kubernetes.io/projected/5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb-kube-api-access-9kkjt\") pod \"coredns-5d78c9869d-zgbp8\" (UID: \"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb\") " pod="kube-system/coredns-5d78c9869d-zgbp8" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.455659 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6c3e4b67-0877-4b7d-b668-9108de84a2f8-tigera-ca-bundle\") pod \"calico-kube-controllers-55db54bcd5-fhbcg\" (UID: \"6c3e4b67-0877-4b7d-b668-9108de84a2f8\") " pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" Feb 9 19:39:08.661708 kubelet[2407]: I0209 19:39:08.455687 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1c291956-25a7-49fb-824d-82207617643e-config-volume\") pod \"coredns-5d78c9869d-88nsv\" (UID: \"1c291956-25a7-49fb-824d-82207617643e\") " pod="kube-system/coredns-5d78c9869d-88nsv" Feb 9 19:39:08.375074 systemd[1]: Created slice kubepods-burstable-pod1c291956_25a7_49fb_824d_82207617643e.slice. Feb 9 19:39:08.662315 kubelet[2407]: I0209 19:39:08.455729 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qf67w\" (UniqueName: \"kubernetes.io/projected/6c3e4b67-0877-4b7d-b668-9108de84a2f8-kube-api-access-qf67w\") pod \"calico-kube-controllers-55db54bcd5-fhbcg\" (UID: \"6c3e4b67-0877-4b7d-b668-9108de84a2f8\") " pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" Feb 9 19:39:08.662315 kubelet[2407]: I0209 19:39:08.455755 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2xfhg\" (UniqueName: \"kubernetes.io/projected/1c291956-25a7-49fb-824d-82207617643e-kube-api-access-2xfhg\") pod \"coredns-5d78c9869d-88nsv\" (UID: \"1c291956-25a7-49fb-824d-82207617643e\") " pod="kube-system/coredns-5d78c9869d-88nsv" Feb 9 19:39:08.394228 systemd[1]: Created slice kubepods-burstable-pod5ca0c8c9_0f62_457b_b2c3_ffc0245a5ebb.slice. Feb 9 19:39:08.400449 systemd[1]: Created slice kubepods-besteffort-pod6c3e4b67_0877_4b7d_b668_9108de84a2f8.slice. Feb 9 19:39:08.924355 systemd[1]: Created slice kubepods-besteffort-pod7d41cefc_5827_4c72_a472_2588d552dd8b.slice. Feb 9 19:39:08.927117 env[1321]: time="2024-02-09T19:39:08.927074248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mpmzs,Uid:7d41cefc-5827-4c72-a472-2588d552dd8b,Namespace:calico-system,Attempt:0,}" Feb 9 19:39:08.959182 env[1321]: time="2024-02-09T19:39:08.959119221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55db54bcd5-fhbcg,Uid:6c3e4b67-0877-4b7d-b668-9108de84a2f8,Namespace:calico-system,Attempt:0,}" Feb 9 19:39:08.962262 env[1321]: time="2024-02-09T19:39:08.961934337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zgbp8,Uid:5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb,Namespace:kube-system,Attempt:0,}" Feb 9 19:39:08.962262 env[1321]: time="2024-02-09T19:39:08.962050437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-88nsv,Uid:1c291956-25a7-49fb-824d-82207617643e,Namespace:kube-system,Attempt:0,}" Feb 9 19:39:10.019082 env[1321]: time="2024-02-09T19:39:10.019011905Z" level=info msg="shim disconnected" id=26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77 Feb 9 19:39:10.019082 env[1321]: time="2024-02-09T19:39:10.019076005Z" level=warning msg="cleaning up after shim disconnected" id=26a8b4f2ff917aa61e62ca9053d953a2c343d8de395393213d18daa33b8d8c77 namespace=k8s.io Feb 9 19:39:10.019082 env[1321]: time="2024-02-09T19:39:10.019092405Z" level=info msg="cleaning up dead shim" Feb 9 19:39:10.030613 env[1321]: time="2024-02-09T19:39:10.030560966Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:39:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3461 runtime=io.containerd.runc.v2\n" Feb 9 19:39:10.126706 env[1321]: time="2024-02-09T19:39:10.126663575Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:39:10.266901 env[1321]: time="2024-02-09T19:39:10.266369015Z" level=error msg="Failed to destroy network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.267333 env[1321]: time="2024-02-09T19:39:10.267275620Z" level=error msg="encountered an error cleaning up failed sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.267455 env[1321]: time="2024-02-09T19:39:10.267356820Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zgbp8,Uid:5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.269463 kubelet[2407]: E0209 19:39:10.267799 2407 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.269463 kubelet[2407]: E0209 19:39:10.268288 2407 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zgbp8" Feb 9 19:39:10.269463 kubelet[2407]: E0209 19:39:10.268445 2407 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zgbp8" Feb 9 19:39:10.269920 kubelet[2407]: E0209 19:39:10.268612 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-zgbp8_kube-system(5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-zgbp8_kube-system(5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zgbp8" podUID=5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb Feb 9 19:39:10.282039 env[1321]: time="2024-02-09T19:39:10.281980398Z" level=error msg="Failed to destroy network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.282591 env[1321]: time="2024-02-09T19:39:10.282546501Z" level=error msg="encountered an error cleaning up failed sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.282777 env[1321]: time="2024-02-09T19:39:10.282734402Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55db54bcd5-fhbcg,Uid:6c3e4b67-0877-4b7d-b668-9108de84a2f8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.283231 kubelet[2407]: E0209 19:39:10.283204 2407 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.283332 kubelet[2407]: E0209 19:39:10.283285 2407 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" Feb 9 19:39:10.283332 kubelet[2407]: E0209 19:39:10.283315 2407 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" Feb 9 19:39:10.283492 kubelet[2407]: E0209 19:39:10.283419 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55db54bcd5-fhbcg_calico-system(6c3e4b67-0877-4b7d-b668-9108de84a2f8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55db54bcd5-fhbcg_calico-system(6c3e4b67-0877-4b7d-b668-9108de84a2f8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" podUID=6c3e4b67-0877-4b7d-b668-9108de84a2f8 Feb 9 19:39:10.314308 env[1321]: time="2024-02-09T19:39:10.314230369Z" level=error msg="Failed to destroy network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.314879 env[1321]: time="2024-02-09T19:39:10.314670371Z" level=error msg="encountered an error cleaning up failed sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.314879 env[1321]: time="2024-02-09T19:39:10.314756471Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mpmzs,Uid:7d41cefc-5827-4c72-a472-2588d552dd8b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.315142 kubelet[2407]: E0209 19:39:10.315106 2407 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.315219 kubelet[2407]: E0209 19:39:10.315208 2407 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:39:10.315271 kubelet[2407]: E0209 19:39:10.315254 2407 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mpmzs" Feb 9 19:39:10.315359 kubelet[2407]: E0209 19:39:10.315343 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mpmzs_calico-system(7d41cefc-5827-4c72-a472-2588d552dd8b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mpmzs_calico-system(7d41cefc-5827-4c72-a472-2588d552dd8b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:10.316622 env[1321]: time="2024-02-09T19:39:10.316557581Z" level=error msg="Failed to destroy network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.317258 env[1321]: time="2024-02-09T19:39:10.317185084Z" level=error msg="encountered an error cleaning up failed sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.317503 env[1321]: time="2024-02-09T19:39:10.317444586Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-88nsv,Uid:1c291956-25a7-49fb-824d-82207617643e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.317905 kubelet[2407]: E0209 19:39:10.317816 2407 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:10.317905 kubelet[2407]: E0209 19:39:10.317870 2407 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-88nsv" Feb 9 19:39:10.318290 kubelet[2407]: E0209 19:39:10.318254 2407 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-88nsv" Feb 9 19:39:10.318377 kubelet[2407]: E0209 19:39:10.318343 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-88nsv_kube-system(1c291956-25a7-49fb-824d-82207617643e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-88nsv_kube-system(1c291956-25a7-49fb-824d-82207617643e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-88nsv" podUID=1c291956-25a7-49fb-824d-82207617643e Feb 9 19:39:11.090568 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4-shm.mount: Deactivated successfully. Feb 9 19:39:11.090695 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67-shm.mount: Deactivated successfully. Feb 9 19:39:11.090776 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177-shm.mount: Deactivated successfully. Feb 9 19:39:11.113973 kubelet[2407]: I0209 19:39:11.113933 2407 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:11.114887 env[1321]: time="2024-02-09T19:39:11.114832703Z" level=info msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" Feb 9 19:39:11.119751 kubelet[2407]: I0209 19:39:11.119712 2407 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:11.122009 env[1321]: time="2024-02-09T19:39:11.121159236Z" level=info msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" Feb 9 19:39:11.124790 kubelet[2407]: I0209 19:39:11.124580 2407 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:11.128158 env[1321]: time="2024-02-09T19:39:11.127633270Z" level=info msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" Feb 9 19:39:11.132090 kubelet[2407]: I0209 19:39:11.129544 2407 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:11.133365 env[1321]: time="2024-02-09T19:39:11.133327000Z" level=info msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" Feb 9 19:39:11.176252 env[1321]: time="2024-02-09T19:39:11.176166424Z" level=error msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" failed" error="failed to destroy network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:11.176953 kubelet[2407]: E0209 19:39:11.176773 2407 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:11.176953 kubelet[2407]: E0209 19:39:11.176824 2407 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177} Feb 9 19:39:11.176953 kubelet[2407]: E0209 19:39:11.176871 2407 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:39:11.176953 kubelet[2407]: E0209 19:39:11.176907 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zgbp8" podUID=5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb Feb 9 19:39:11.207704 env[1321]: time="2024-02-09T19:39:11.207621789Z" level=error msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" failed" error="failed to destroy network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:11.208539 kubelet[2407]: E0209 19:39:11.208305 2407 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:11.208539 kubelet[2407]: E0209 19:39:11.208367 2407 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67} Feb 9 19:39:11.208539 kubelet[2407]: E0209 19:39:11.208453 2407 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7d41cefc-5827-4c72-a472-2588d552dd8b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:39:11.208539 kubelet[2407]: E0209 19:39:11.208511 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7d41cefc-5827-4c72-a472-2588d552dd8b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mpmzs" podUID=7d41cefc-5827-4c72-a472-2588d552dd8b Feb 9 19:39:11.213363 env[1321]: time="2024-02-09T19:39:11.213298618Z" level=error msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" failed" error="failed to destroy network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:11.213654 kubelet[2407]: E0209 19:39:11.213626 2407 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:11.213764 kubelet[2407]: E0209 19:39:11.213678 2407 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a} Feb 9 19:39:11.213764 kubelet[2407]: E0209 19:39:11.213724 2407 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c291956-25a7-49fb-824d-82207617643e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:39:11.213903 kubelet[2407]: E0209 19:39:11.213764 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c291956-25a7-49fb-824d-82207617643e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-88nsv" podUID=1c291956-25a7-49fb-824d-82207617643e Feb 9 19:39:11.218965 env[1321]: time="2024-02-09T19:39:11.218893748Z" level=error msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" failed" error="failed to destroy network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:39:11.219265 kubelet[2407]: E0209 19:39:11.219243 2407 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:11.219373 kubelet[2407]: E0209 19:39:11.219288 2407 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4} Feb 9 19:39:11.219373 kubelet[2407]: E0209 19:39:11.219338 2407 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c3e4b67-0877-4b7d-b668-9108de84a2f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:39:11.219531 kubelet[2407]: E0209 19:39:11.219377 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c3e4b67-0877-4b7d-b668-9108de84a2f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" podUID=6c3e4b67-0877-4b7d-b668-9108de84a2f8 Feb 9 19:39:13.329531 kubelet[2407]: I0209 19:39:13.329127 2407 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:39:13.358000 audit[3683]: NETFILTER_CFG table=filter:105 family=2 entries=15 op=nft_register_rule pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:13.369592 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:39:13.369755 kernel: audit: type=1325 audit(1707507553.358:1148): table=filter:105 family=2 entries=15 op=nft_register_rule pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:13.358000 audit[3683]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc41d39f20 a2=0 a3=7ffc41d39f0c items=0 ppid=2587 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:13.414173 kernel: audit: type=1300 audit(1707507553.358:1148): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc41d39f20 a2=0 a3=7ffc41d39f0c items=0 ppid=2587 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:13.414413 kernel: audit: type=1327 audit(1707507553.358:1148): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:13.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:13.360000 audit[3683]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:13.425372 kernel: audit: type=1325 audit(1707507553.360:1149): table=nat:106 family=2 entries=19 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:13.360000 audit[3683]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc41d39f20 a2=0 a3=7ffc41d39f0c items=0 ppid=2587 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:13.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:13.461511 kernel: audit: type=1300 audit(1707507553.360:1149): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc41d39f20 a2=0 a3=7ffc41d39f0c items=0 ppid=2587 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:13.461761 kernel: audit: type=1327 audit(1707507553.360:1149): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:19.644275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2557397537.mount: Deactivated successfully. Feb 9 19:39:19.748978 env[1321]: time="2024-02-09T19:39:19.748920813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:19.754777 env[1321]: time="2024-02-09T19:39:19.754728841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:19.759000 env[1321]: time="2024-02-09T19:39:19.758959061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:19.762043 env[1321]: time="2024-02-09T19:39:19.762006976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:19.762472 env[1321]: time="2024-02-09T19:39:19.762439278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:39:19.781211 env[1321]: time="2024-02-09T19:39:19.781159468Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:39:19.807861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3687715918.mount: Deactivated successfully. Feb 9 19:39:19.812436 env[1321]: time="2024-02-09T19:39:19.812374018Z" level=info msg="CreateContainer within sandbox \"2b05b96bbfab4de799b46a1ed66e80aefd7c5f1a614c9bc723290cd7ea1dec80\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28\"" Feb 9 19:39:19.813289 env[1321]: time="2024-02-09T19:39:19.813112722Z" level=info msg="StartContainer for \"260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28\"" Feb 9 19:39:19.831368 systemd[1]: Started cri-containerd-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28.scope. Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3303 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:19.885884 kernel: audit: type=1400 audit(1707507559.852:1150): avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.886051 kernel: audit: type=1300 audit(1707507559.852:1150): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3303 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:19.886560 kernel: audit: type=1327 audit(1707507559.852:1150): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236306330633633643732356137323230396663343665356436306339 Feb 9 19:39:19.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236306330633633643732356137323230396663343665356436306339 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.920426 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.950056 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.950195 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.965491 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.966067 env[1321]: time="2024-02-09T19:39:19.966007057Z" level=info msg="StartContainer for \"260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28\" returns successfully" Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:20.002992 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:20.003158 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:20.003186 kernel: audit: type=1400 audit(1707507559.852:1151): avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.852000 audit: BPF prog-id=155 op=LOAD Feb 9 19:39:19.852000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b7a70 items=0 ppid=3303 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:19.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236306330633633643732356137323230396663343665356436306339 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.865000 audit: BPF prog-id=156 op=LOAD Feb 9 19:39:19.865000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b7ab8 items=0 ppid=3303 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:19.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236306330633633643732356137323230396663343665356436306339 Feb 9 19:39:19.885000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:39:19.885000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:19.885000 audit: BPF prog-id=157 op=LOAD Feb 9 19:39:19.885000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b7b48 items=0 ppid=3303 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236306330633633643732356137323230396663343665356436306339 Feb 9 19:39:20.195491 kubelet[2407]: I0209 19:39:20.194897 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gfztf" podStartSLOduration=1.497548329 podCreationTimestamp="2024-02-09 19:38:58 +0000 UTC" firstStartedPulling="2024-02-09 19:38:59.065532461 +0000 UTC m=+34.357473559" lastFinishedPulling="2024-02-09 19:39:19.76281498 +0000 UTC m=+55.054756178" observedRunningTime="2024-02-09 19:39:20.19327844 +0000 UTC m=+55.485219538" watchObservedRunningTime="2024-02-09 19:39:20.194830948 +0000 UTC m=+55.486772146" Feb 9 19:39:20.234897 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:39:20.235087 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:39:21.175703 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.0qKdUM.mount: Deactivated successfully. Feb 9 19:39:21.240000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.240000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e1fc50 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:21.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:21.241000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.241000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025eb6e0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:21.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:21.675000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.675000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c014502560 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.675000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.675000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0118f9230 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.675000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.675000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0118f9260 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.677000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.677000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01468a630 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.696000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.696000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01468a720 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.696000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:21.696000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0117e0ac0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:39:21.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:39:21.743000 audit[3847]: AVC avc: denied { write } for pid=3847 comm="tee" name="fd" dev="proc" ino=31585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.754000 audit[3845]: AVC avc: denied { write } for pid=3845 comm="tee" name="fd" dev="proc" ino=31591 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.754000 audit[3845]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5d42696d a2=241 a3=1b6 items=1 ppid=3808 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.743000 audit[3847]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcd65d95e a2=241 a3=1b6 items=1 ppid=3805 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.743000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:39:21.743000 audit: PATH item=0 name="/dev/fd/63" inode=31567 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.762000 audit[3859]: AVC avc: denied { write } for pid=3859 comm="tee" name="fd" dev="proc" ino=31602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.743000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.764000 audit[3861]: AVC avc: denied { write } for pid=3861 comm="tee" name="fd" dev="proc" ino=31605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.754000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:39:21.754000 audit: PATH item=0 name="/dev/fd/63" inode=31564 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.754000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.764000 audit[3861]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5a25896d a2=241 a3=1b6 items=1 ppid=3813 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.764000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:39:21.764000 audit: PATH item=0 name="/dev/fd/63" inode=31577 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.772000 audit[3870]: AVC avc: denied { write } for pid=3870 comm="tee" name="fd" dev="proc" ino=31610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.762000 audit[3859]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd13ae796e a2=241 a3=1b6 items=1 ppid=3814 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.762000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:39:21.762000 audit: PATH item=0 name="/dev/fd/63" inode=31574 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.775000 audit[3874]: AVC avc: denied { write } for pid=3874 comm="tee" name="fd" dev="proc" ino=30562 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.775000 audit[3874]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe90a2796f a2=241 a3=1b6 items=1 ppid=3809 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.775000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:39:21.775000 audit: PATH item=0 name="/dev/fd/63" inode=31598 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.775000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.772000 audit[3870]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb9b0496d a2=241 a3=1b6 items=1 ppid=3819 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.772000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:39:21.772000 audit: PATH item=0 name="/dev/fd/63" inode=31588 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:21.786000 audit[3877]: AVC avc: denied { write } for pid=3877 comm="tee" name="fd" dev="proc" ino=30567 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:39:21.786000 audit[3877]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0f00d95d a2=241 a3=1b6 items=1 ppid=3807 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:21.786000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:39:21.786000 audit: PATH item=0 name="/dev/fd/63" inode=31606 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:21.786000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit: BPF prog-id=158 op=LOAD Feb 9 19:39:22.174000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea5e42de0 a2=70 a3=7fd548941000 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.174000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit: BPF prog-id=159 op=LOAD Feb 9 19:39:22.174000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea5e42de0 a2=70 a3=6e items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.174000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea5e42d90 a2=70 a3=7ffea5e42de0 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.174000 audit: BPF prog-id=160 op=LOAD Feb 9 19:39:22.174000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffea5e42d70 a2=70 a3=7ffea5e42de0 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.175000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea5e42e50 a2=70 a3=0 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea5e42e40 a2=70 a3=0 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffea5e42e80 a2=70 a3=0 items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.175000 audit: BPF prog-id=161 op=LOAD Feb 9 19:39:22.175000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffea5e42da0 a2=70 a3=ffffffff items=0 ppid=3822 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:39:22.182000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.182000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd146e28c0 a2=70 a3=fff80800 items=0 ppid=3822 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:39:22.182000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:22.182000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd146e2790 a2=70 a3=3 items=0 ppid=3822 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:39:22.192000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:39:22.307000 audit[3970]: NETFILTER_CFG table=mangle:107 family=2 entries=19 op=nft_register_chain pid=3970 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:22.307000 audit[3970]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff3f362bd0 a2=0 a3=7fff3f362bbc items=0 ppid=3822 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.307000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:22.313000 audit[3971]: NETFILTER_CFG table=nat:108 family=2 entries=16 op=nft_register_chain pid=3971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:22.313000 audit[3971]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcadf0d740 a2=0 a3=7ffcadf0d72c items=0 ppid=3822 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.313000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:22.316000 audit[3976]: NETFILTER_CFG table=filter:109 family=2 entries=39 op=nft_register_chain pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:22.316000 audit[3976]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffa9473470 a2=0 a3=5634bb1de000 items=0 ppid=3822 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:22.317000 audit[3969]: NETFILTER_CFG table=raw:110 family=2 entries=19 op=nft_register_chain pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:22.317000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcbe07cdb0 a2=0 a3=5599434cd000 items=0 ppid=3822 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:22.920481 env[1321]: time="2024-02-09T19:39:22.920426498Z" level=info msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" Feb 9 19:39:22.923109 env[1321]: time="2024-02-09T19:39:22.922421307Z" level=info msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.984 [INFO][4016] k8s.go 578: Cleaning up netns ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.985 [INFO][4016] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" iface="eth0" netns="/var/run/netns/cni-b3c1c08b-6154-00ef-0936-1d2cd40d5df9" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.985 [INFO][4016] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" iface="eth0" netns="/var/run/netns/cni-b3c1c08b-6154-00ef-0936-1d2cd40d5df9" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.985 [INFO][4016] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" iface="eth0" netns="/var/run/netns/cni-b3c1c08b-6154-00ef-0936-1d2cd40d5df9" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.985 [INFO][4016] k8s.go 585: Releasing IP address(es) ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:22.985 [INFO][4016] utils.go 188: Calico CNI releasing IP address ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.022 [INFO][4023] ipam_plugin.go 415: Releasing address using handleID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.022 [INFO][4023] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.022 [INFO][4023] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.034 [WARNING][4023] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.034 [INFO][4023] ipam_plugin.go 443: Releasing address using workloadID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.035 [INFO][4023] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:23.042922 env[1321]: 2024-02-09 19:39:23.038 [INFO][4016] k8s.go 591: Teardown processing complete. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:23.043619 env[1321]: time="2024-02-09T19:39:23.043564371Z" level=info msg="TearDown network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" successfully" Feb 9 19:39:23.043741 env[1321]: time="2024-02-09T19:39:23.043723172Z" level=info msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" returns successfully" Feb 9 19:39:23.044762 env[1321]: time="2024-02-09T19:39:23.044726577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-88nsv,Uid:1c291956-25a7-49fb-824d-82207617643e,Namespace:kube-system,Attempt:1,}" Feb 9 19:39:23.046351 systemd[1]: run-netns-cni\x2db3c1c08b\x2d6154\x2d00ef\x2d0936\x2d1d2cd40d5df9.mount: Deactivated successfully. Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.994 [INFO][4011] k8s.go 578: Cleaning up netns ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.994 [INFO][4011] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" iface="eth0" netns="/var/run/netns/cni-1ab93f30-4505-781c-524d-309a3ed889e7" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.994 [INFO][4011] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" iface="eth0" netns="/var/run/netns/cni-1ab93f30-4505-781c-524d-309a3ed889e7" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.995 [INFO][4011] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" iface="eth0" netns="/var/run/netns/cni-1ab93f30-4505-781c-524d-309a3ed889e7" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.995 [INFO][4011] k8s.go 585: Releasing IP address(es) ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:22.995 [INFO][4011] utils.go 188: Calico CNI releasing IP address ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.038 [INFO][4027] ipam_plugin.go 415: Releasing address using handleID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.039 [INFO][4027] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.039 [INFO][4027] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.049 [WARNING][4027] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.049 [INFO][4027] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.051 [INFO][4027] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:23.055355 env[1321]: 2024-02-09 19:39:23.053 [INFO][4011] k8s.go 591: Teardown processing complete. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:23.057560 env[1321]: time="2024-02-09T19:39:23.057516836Z" level=info msg="TearDown network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" successfully" Feb 9 19:39:23.057743 env[1321]: time="2024-02-09T19:39:23.057719437Z" level=info msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" returns successfully" Feb 9 19:39:23.058767 env[1321]: time="2024-02-09T19:39:23.058731542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zgbp8,Uid:5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb,Namespace:kube-system,Attempt:1,}" Feb 9 19:39:23.060318 systemd[1]: run-netns-cni\x2d1ab93f30\x2d4505\x2d781c\x2d524d\x2d309a3ed889e7.mount: Deactivated successfully. Feb 9 19:39:23.114881 systemd-networkd[1446]: vxlan.calico: Link UP Feb 9 19:39:23.114893 systemd-networkd[1446]: vxlan.calico: Gained carrier Feb 9 19:39:23.284514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:39:23.284657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliceb1035bd2f: link becomes ready Feb 9 19:39:23.272547 systemd-networkd[1446]: caliceb1035bd2f: Link UP Feb 9 19:39:23.291953 systemd-networkd[1446]: caliceb1035bd2f: Gained carrier Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.167 [INFO][4039] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0 coredns-5d78c9869d- kube-system 1c291956-25a7-49fb-824d-82207617643e 812 0 2024-02-09 19:38:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f coredns-5d78c9869d-88nsv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliceb1035bd2f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.168 [INFO][4039] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.225 [INFO][4066] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" HandleID="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.238 [INFO][4066] ipam_plugin.go 268: Auto assigning IP ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" HandleID="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023c840), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"coredns-5d78c9869d-88nsv", "timestamp":"2024-02-09 19:39:23.225031812 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.238 [INFO][4066] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.239 [INFO][4066] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.239 [INFO][4066] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.242 [INFO][4066] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.248 [INFO][4066] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.251 [INFO][4066] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.253 [INFO][4066] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.255 [INFO][4066] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.255 [INFO][4066] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.257 [INFO][4066] ipam.go 1682: Creating new handle: k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.261 [INFO][4066] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.265 [INFO][4066] ipam.go 1216: Successfully claimed IPs: [192.168.62.1/26] block=192.168.62.0/26 handle="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.265 [INFO][4066] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.1/26] handle="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.265 [INFO][4066] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:23.305580 env[1321]: 2024-02-09 19:39:23.266 [INFO][4066] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.1/26] IPv6=[] ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" HandleID="k8s-pod-network.d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.267 [INFO][4039] k8s.go 385: Populated endpoint ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"1c291956-25a7-49fb-824d-82207617643e", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"coredns-5d78c9869d-88nsv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliceb1035bd2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.267 [INFO][4039] k8s.go 386: Calico CNI using IPs: [192.168.62.1/32] ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.267 [INFO][4039] dataplane_linux.go 68: Setting the host side veth name to caliceb1035bd2f ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.293 [INFO][4039] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.294 [INFO][4039] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"1c291956-25a7-49fb-824d-82207617643e", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba", Pod:"coredns-5d78c9869d-88nsv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliceb1035bd2f", MAC:"06:94:f5:3e:31:10", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:23.306594 env[1321]: 2024-02-09 19:39:23.302 [INFO][4039] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba" Namespace="kube-system" Pod="coredns-5d78c9869d-88nsv" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:23.332043 systemd-networkd[1446]: calibb16a02e91e: Link UP Feb 9 19:39:23.337435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb16a02e91e: link becomes ready Feb 9 19:39:23.336244 systemd-networkd[1446]: calibb16a02e91e: Gained carrier Feb 9 19:39:23.354727 env[1321]: time="2024-02-09T19:39:23.354648312Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:23.354923 env[1321]: time="2024-02-09T19:39:23.354735312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:23.354923 env[1321]: time="2024-02-09T19:39:23.354764112Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:23.354923 env[1321]: time="2024-02-09T19:39:23.354903813Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba pid=4099 runtime=io.containerd.runc.v2 Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.188 [INFO][4046] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0 coredns-5d78c9869d- kube-system 5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb 813 0 2024-02-09 19:38:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f coredns-5d78c9869d-zgbp8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibb16a02e91e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.188 [INFO][4046] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.237 [INFO][4071] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" HandleID="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.248 [INFO][4071] ipam_plugin.go 268: Auto assigning IP ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" HandleID="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bf210), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"coredns-5d78c9869d-zgbp8", "timestamp":"2024-02-09 19:39:23.23763357 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.248 [INFO][4071] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.265 [INFO][4071] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.265 [INFO][4071] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.271 [INFO][4071] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.289 [INFO][4071] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.298 [INFO][4071] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.307 [INFO][4071] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.311 [INFO][4071] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.311 [INFO][4071] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.313 [INFO][4071] ipam.go 1682: Creating new handle: k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2 Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.318 [INFO][4071] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.323 [INFO][4071] ipam.go 1216: Successfully claimed IPs: [192.168.62.2/26] block=192.168.62.0/26 handle="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.323 [INFO][4071] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.2/26] handle="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.323 [INFO][4071] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:23.362563 env[1321]: 2024-02-09 19:39:23.323 [INFO][4071] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.2/26] IPv6=[] ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" HandleID="k8s-pod-network.d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.325 [INFO][4046] k8s.go 385: Populated endpoint ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"coredns-5d78c9869d-zgbp8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb16a02e91e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.325 [INFO][4046] k8s.go 386: Calico CNI using IPs: [192.168.62.2/32] ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.325 [INFO][4046] dataplane_linux.go 68: Setting the host side veth name to calibb16a02e91e ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.338 [INFO][4046] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.347 [INFO][4046] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2", Pod:"coredns-5d78c9869d-zgbp8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb16a02e91e", MAC:"22:d6:90:f6:df:0a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:23.363744 env[1321]: 2024-02-09 19:39:23.359 [INFO][4046] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2" Namespace="kube-system" Pod="coredns-5d78c9869d-zgbp8" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:23.377931 systemd[1]: Started cri-containerd-d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba.scope. Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.402000 audit: BPF prog-id=162 op=LOAD Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4099 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386135303237663433383564383335323466393434646262386533 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4099 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386135303237663433383564383335323466393434646262386533 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit: BPF prog-id=163 op=LOAD Feb 9 19:39:23.403000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003941d0 items=0 ppid=4099 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386135303237663433383564383335323466393434646262386533 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit: BPF prog-id=164 op=LOAD Feb 9 19:39:23.403000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000394218 items=0 ppid=4099 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386135303237663433383564383335323466393434646262386533 Feb 9 19:39:23.403000 audit: BPF prog-id=164 op=UNLOAD Feb 9 19:39:23.403000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.403000 audit: BPF prog-id=165 op=LOAD Feb 9 19:39:23.403000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000394628 items=0 ppid=4099 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430386135303237663433383564383335323466393434646262386533 Feb 9 19:39:23.414815 env[1321]: time="2024-02-09T19:39:23.414719590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:23.414981 env[1321]: time="2024-02-09T19:39:23.414820691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:23.414981 env[1321]: time="2024-02-09T19:39:23.414851991Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:23.415087 env[1321]: time="2024-02-09T19:39:23.415013191Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2 pid=4145 runtime=io.containerd.runc.v2 Feb 9 19:39:23.419000 audit[4149]: NETFILTER_CFG table=filter:111 family=2 entries=36 op=nft_register_chain pid=4149 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:23.419000 audit[4149]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffdce209b60 a2=0 a3=7ffdce209b4c items=0 ppid=3822 pid=4149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.419000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:23.433173 systemd[1]: Started cri-containerd-d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2.scope. Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit: BPF prog-id=166 op=LOAD Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4145 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346238396163366135653733623237383231333162346561636239 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4145 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346238396163366135653733623237383231333162346561636239 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.464000 audit: BPF prog-id=167 op=LOAD Feb 9 19:39:23.464000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d0830 items=0 ppid=4145 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346238396163366135653733623237383231333162346561636239 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit: BPF prog-id=168 op=LOAD Feb 9 19:39:23.465000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d0878 items=0 ppid=4145 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346238396163366135653733623237383231333162346561636239 Feb 9 19:39:23.465000 audit: BPF prog-id=168 op=UNLOAD Feb 9 19:39:23.465000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.465000 audit: BPF prog-id=169 op=LOAD Feb 9 19:39:23.465000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d0c88 items=0 ppid=4145 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346238396163366135653733623237383231333162346561636239 Feb 9 19:39:23.469428 env[1321]: time="2024-02-09T19:39:23.468351538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-88nsv,Uid:1c291956-25a7-49fb-824d-82207617643e,Namespace:kube-system,Attempt:1,} returns sandbox id \"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba\"" Feb 9 19:39:23.474534 env[1321]: time="2024-02-09T19:39:23.474489067Z" level=info msg="CreateContainer within sandbox \"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:39:23.486000 audit[4180]: NETFILTER_CFG table=filter:112 family=2 entries=30 op=nft_register_chain pid=4180 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:23.486000 audit[4180]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffeb7570ef0 a2=0 a3=7ffeb7570edc items=0 ppid=3822 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:23.506990 env[1321]: time="2024-02-09T19:39:23.506930517Z" level=info msg="CreateContainer within sandbox \"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6c847c54a86533222dee0d7d97e7f84955a17bc5a98ccb5a63ddf621a48f44a6\"" Feb 9 19:39:23.507942 env[1321]: time="2024-02-09T19:39:23.507906222Z" level=info msg="StartContainer for \"6c847c54a86533222dee0d7d97e7f84955a17bc5a98ccb5a63ddf621a48f44a6\"" Feb 9 19:39:23.514819 env[1321]: time="2024-02-09T19:39:23.514780853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zgbp8,Uid:5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb,Namespace:kube-system,Attempt:1,} returns sandbox id \"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2\"" Feb 9 19:39:23.520315 env[1321]: time="2024-02-09T19:39:23.520280679Z" level=info msg="CreateContainer within sandbox \"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:39:23.535809 systemd[1]: Started cri-containerd-6c847c54a86533222dee0d7d97e7f84955a17bc5a98ccb5a63ddf621a48f44a6.scope. Feb 9 19:39:23.561897 env[1321]: time="2024-02-09T19:39:23.561752571Z" level=info msg="CreateContainer within sandbox \"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6bfcf10019e9b0123ae4319db31ce312e9dfda28401ec7870c94c45f375575a0\"" Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.565000 audit: BPF prog-id=170 op=LOAD Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4099 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663383437633534613836353333323232646565306437643937653766 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4099 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663383437633534613836353333323232646565306437643937653766 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.566000 audit: BPF prog-id=171 op=LOAD Feb 9 19:39:23.566000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003389d0 items=0 ppid=4099 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663383437633534613836353333323232646565306437643937653766 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit: BPF prog-id=172 op=LOAD Feb 9 19:39:23.567000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000338a18 items=0 ppid=4099 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663383437633534613836353333323232646565306437643937653766 Feb 9 19:39:23.567000 audit: BPF prog-id=172 op=UNLOAD Feb 9 19:39:23.567000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.567000 audit: BPF prog-id=173 op=LOAD Feb 9 19:39:23.567000 audit[4199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000338e28 items=0 ppid=4099 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663383437633534613836353333323232646565306437643937653766 Feb 9 19:39:23.575617 env[1321]: time="2024-02-09T19:39:23.569257706Z" level=info msg="StartContainer for \"6bfcf10019e9b0123ae4319db31ce312e9dfda28401ec7870c94c45f375575a0\"" Feb 9 19:39:23.595511 env[1321]: time="2024-02-09T19:39:23.595448227Z" level=info msg="StartContainer for \"6c847c54a86533222dee0d7d97e7f84955a17bc5a98ccb5a63ddf621a48f44a6\" returns successfully" Feb 9 19:39:23.608862 systemd[1]: Started cri-containerd-6bfcf10019e9b0123ae4319db31ce312e9dfda28401ec7870c94c45f375575a0.scope. Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.643000 audit: BPF prog-id=174 op=LOAD Feb 9 19:39:23.644000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.644000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4145 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666366313030313965396230313233616534333139646233316365 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4145 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666366313030313965396230313233616534333139646233316365 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.645000 audit: BPF prog-id=175 op=LOAD Feb 9 19:39:23.645000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001eef90 items=0 ppid=4145 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666366313030313965396230313233616534333139646233316365 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.646000 audit: BPF prog-id=176 op=LOAD Feb 9 19:39:23.646000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001eefd8 items=0 ppid=4145 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666366313030313965396230313233616534333139646233316365 Feb 9 19:39:23.647000 audit: BPF prog-id=176 op=UNLOAD Feb 9 19:39:23.647000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:23.647000 audit: BPF prog-id=177 op=LOAD Feb 9 19:39:23.647000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ef3e8 items=0 ppid=4145 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:23.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666366313030313965396230313233616534333139646233316365 Feb 9 19:39:23.672595 env[1321]: time="2024-02-09T19:39:23.672541184Z" level=info msg="StartContainer for \"6bfcf10019e9b0123ae4319db31ce312e9dfda28401ec7870c94c45f375575a0\" returns successfully" Feb 9 19:39:23.919527 env[1321]: time="2024-02-09T19:39:23.919471227Z" level=info msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" Feb 9 19:39:23.920706 env[1321]: time="2024-02-09T19:39:23.920669133Z" level=info msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.989 [INFO][4293] k8s.go 578: Cleaning up netns ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.989 [INFO][4293] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" iface="eth0" netns="/var/run/netns/cni-249b94f8-87a8-9701-3d26-ae571ddeaa36" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.989 [INFO][4293] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" iface="eth0" netns="/var/run/netns/cni-249b94f8-87a8-9701-3d26-ae571ddeaa36" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.989 [INFO][4293] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" iface="eth0" netns="/var/run/netns/cni-249b94f8-87a8-9701-3d26-ae571ddeaa36" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.990 [INFO][4293] k8s.go 585: Releasing IP address(es) ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:23.990 [INFO][4293] utils.go 188: Calico CNI releasing IP address ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.027 [INFO][4310] ipam_plugin.go 415: Releasing address using handleID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.028 [INFO][4310] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.028 [INFO][4310] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.035 [WARNING][4310] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.037 [INFO][4310] ipam_plugin.go 443: Releasing address using workloadID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.038 [INFO][4310] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:24.040594 env[1321]: 2024-02-09 19:39:24.039 [INFO][4293] k8s.go 591: Teardown processing complete. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:24.041241 env[1321]: time="2024-02-09T19:39:24.041202489Z" level=info msg="TearDown network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" successfully" Feb 9 19:39:24.041314 env[1321]: time="2024-02-09T19:39:24.041298690Z" level=info msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" returns successfully" Feb 9 19:39:24.042234 env[1321]: time="2024-02-09T19:39:24.042199094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mpmzs,Uid:7d41cefc-5827-4c72-a472-2588d552dd8b,Namespace:calico-system,Attempt:1,}" Feb 9 19:39:24.059269 systemd[1]: run-netns-cni\x2d249b94f8\x2d87a8\x2d9701\x2d3d26\x2dae571ddeaa36.mount: Deactivated successfully. Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.993 [INFO][4303] k8s.go 578: Cleaning up netns ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.993 [INFO][4303] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" iface="eth0" netns="/var/run/netns/cni-f4d9d7c9-1fcb-3e1e-dc70-240a53d94931" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.994 [INFO][4303] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" iface="eth0" netns="/var/run/netns/cni-f4d9d7c9-1fcb-3e1e-dc70-240a53d94931" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.994 [INFO][4303] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" iface="eth0" netns="/var/run/netns/cni-f4d9d7c9-1fcb-3e1e-dc70-240a53d94931" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.994 [INFO][4303] k8s.go 585: Releasing IP address(es) ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:23.994 [INFO][4303] utils.go 188: Calico CNI releasing IP address ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.035 [INFO][4311] ipam_plugin.go 415: Releasing address using handleID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.037 [INFO][4311] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.041 [INFO][4311] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.065 [WARNING][4311] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.065 [INFO][4311] ipam_plugin.go 443: Releasing address using workloadID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.067 [INFO][4311] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:24.069516 env[1321]: 2024-02-09 19:39:24.068 [INFO][4303] k8s.go 591: Teardown processing complete. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:24.074970 env[1321]: time="2024-02-09T19:39:24.069756320Z" level=info msg="TearDown network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" successfully" Feb 9 19:39:24.074970 env[1321]: time="2024-02-09T19:39:24.069819021Z" level=info msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" returns successfully" Feb 9 19:39:24.072485 systemd[1]: run-netns-cni\x2df4d9d7c9\x2d1fcb\x2d3e1e\x2ddc70\x2d240a53d94931.mount: Deactivated successfully. Feb 9 19:39:24.075611 env[1321]: time="2024-02-09T19:39:24.075567347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55db54bcd5-fhbcg,Uid:6c3e4b67-0877-4b7d-b668-9108de84a2f8,Namespace:calico-system,Attempt:1,}" Feb 9 19:39:24.212549 kubelet[2407]: I0209 19:39:24.210052 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-88nsv" podStartSLOduration=45.209976664 podCreationTimestamp="2024-02-09 19:38:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:39:24.188491465 +0000 UTC m=+59.480432563" watchObservedRunningTime="2024-02-09 19:39:24.209976664 +0000 UTC m=+59.501917762" Feb 9 19:39:24.249802 kubelet[2407]: I0209 19:39:24.249755 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-zgbp8" podStartSLOduration=45.249685946 podCreationTimestamp="2024-02-09 19:38:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:39:24.21121787 +0000 UTC m=+59.503158968" watchObservedRunningTime="2024-02-09 19:39:24.249685946 +0000 UTC m=+59.541627144" Feb 9 19:39:24.272000 audit[4349]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=4349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:24.272000 audit[4349]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe20195ec0 a2=0 a3=7ffe20195eac items=0 ppid=2587 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:24.285000 audit[4349]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=4349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:24.285000 audit[4349]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffe20195ec0 a2=0 a3=31030 items=0 ppid=2587 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:24.317000 audit[4357]: NETFILTER_CFG table=filter:115 family=2 entries=11 op=nft_register_rule pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:24.317000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdaea56990 a2=0 a3=7ffdaea5697c items=0 ppid=2587 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:24.339000 audit[4357]: NETFILTER_CFG table=nat:116 family=2 entries=47 op=nft_register_chain pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:24.339000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffdaea56990 a2=0 a3=7ffdaea5697c items=0 ppid=2587 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:24.354833 systemd-networkd[1446]: caliee14f393f5c: Link UP Feb 9 19:39:24.369127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:39:24.369238 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliee14f393f5c: link becomes ready Feb 9 19:39:24.369867 systemd-networkd[1446]: caliee14f393f5c: Gained carrier Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.163 [INFO][4322] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0 csi-node-driver- calico-system 7d41cefc-5827-4c72-a472-2588d552dd8b 831 0 2024-02-09 19:38:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f csi-node-driver-mpmzs eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliee14f393f5c [] []}} ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.163 [INFO][4322] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.263 [INFO][4343] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" HandleID="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.307 [INFO][4343] ipam_plugin.go 268: Auto assigning IP ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" HandleID="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c0a60), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"csi-node-driver-mpmzs", "timestamp":"2024-02-09 19:39:24.263228108 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.307 [INFO][4343] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.307 [INFO][4343] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.307 [INFO][4343] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.310 [INFO][4343] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.318 [INFO][4343] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.329 [INFO][4343] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.333 [INFO][4343] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.335 [INFO][4343] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.335 [INFO][4343] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.338 [INFO][4343] ipam.go 1682: Creating new handle: k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85 Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.341 [INFO][4343] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.347 [INFO][4343] ipam.go 1216: Successfully claimed IPs: [192.168.62.3/26] block=192.168.62.0/26 handle="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.347 [INFO][4343] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.3/26] handle="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.347 [INFO][4343] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:24.381510 env[1321]: 2024-02-09 19:39:24.347 [INFO][4343] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.3/26] IPv6=[] ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" HandleID="k8s-pod-network.92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.349 [INFO][4322] k8s.go 385: Populated endpoint ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d41cefc-5827-4c72-a472-2588d552dd8b", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"csi-node-driver-mpmzs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliee14f393f5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.349 [INFO][4322] k8s.go 386: Calico CNI using IPs: [192.168.62.3/32] ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.349 [INFO][4322] dataplane_linux.go 68: Setting the host side veth name to caliee14f393f5c ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.370 [INFO][4322] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.371 [INFO][4322] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d41cefc-5827-4c72-a472-2588d552dd8b", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85", Pod:"csi-node-driver-mpmzs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliee14f393f5c", MAC:"d6:a6:ff:71:34:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:24.382474 env[1321]: 2024-02-09 19:39:24.379 [INFO][4322] k8s.go 491: Wrote updated endpoint to datastore ContainerID="92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85" Namespace="calico-system" Pod="csi-node-driver-mpmzs" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:24.405933 env[1321]: time="2024-02-09T19:39:24.405863563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:24.406183 env[1321]: time="2024-02-09T19:39:24.406152464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:24.406313 env[1321]: time="2024-02-09T19:39:24.406283865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:24.407322 env[1321]: time="2024-02-09T19:39:24.407279770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85 pid=4380 runtime=io.containerd.runc.v2 Feb 9 19:39:24.434963 systemd[1]: Started cri-containerd-92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85.scope. Feb 9 19:39:24.435650 systemd-networkd[1446]: calibb16a02e91e: Gained IPv6LL Feb 9 19:39:24.438000 audit[4399]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:24.438000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffe02313060 a2=0 a3=7ffe0231304c items=0 ppid=3822 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.438000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:24.450303 systemd-networkd[1446]: cali73cf35b117f: Link UP Feb 9 19:39:24.458058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali73cf35b117f: link becomes ready Feb 9 19:39:24.458807 systemd-networkd[1446]: cali73cf35b117f: Gained carrier Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.244 [INFO][4333] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0 calico-kube-controllers-55db54bcd5- calico-system 6c3e4b67-0877-4b7d-b668-9108de84a2f8 832 0 2024-02-09 19:38:45 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55db54bcd5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f calico-kube-controllers-55db54bcd5-fhbcg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali73cf35b117f [] []}} ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.244 [INFO][4333] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.325 [INFO][4352] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" HandleID="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.338 [INFO][4352] ipam_plugin.go 268: Auto assigning IP ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" HandleID="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291460), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"calico-kube-controllers-55db54bcd5-fhbcg", "timestamp":"2024-02-09 19:39:24.325533094 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.338 [INFO][4352] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.347 [INFO][4352] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.347 [INFO][4352] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.376 [INFO][4352] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.393 [INFO][4352] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.400 [INFO][4352] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.403 [INFO][4352] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.406 [INFO][4352] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.406 [INFO][4352] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.415 [INFO][4352] ipam.go 1682: Creating new handle: k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5 Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.421 [INFO][4352] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.439 [INFO][4352] ipam.go 1216: Successfully claimed IPs: [192.168.62.4/26] block=192.168.62.0/26 handle="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.439 [INFO][4352] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.4/26] handle="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.439 [INFO][4352] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:24.473719 env[1321]: 2024-02-09 19:39:24.439 [INFO][4352] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.4/26] IPv6=[] ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" HandleID="k8s-pod-network.7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.441 [INFO][4333] k8s.go 385: Populated endpoint ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0", GenerateName:"calico-kube-controllers-55db54bcd5-", Namespace:"calico-system", SelfLink:"", UID:"6c3e4b67-0877-4b7d-b668-9108de84a2f8", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55db54bcd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"calico-kube-controllers-55db54bcd5-fhbcg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73cf35b117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.441 [INFO][4333] k8s.go 386: Calico CNI using IPs: [192.168.62.4/32] ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.441 [INFO][4333] dataplane_linux.go 68: Setting the host side veth name to cali73cf35b117f ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.459 [INFO][4333] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.459 [INFO][4333] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0", GenerateName:"calico-kube-controllers-55db54bcd5-", Namespace:"calico-system", SelfLink:"", UID:"6c3e4b67-0877-4b7d-b668-9108de84a2f8", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55db54bcd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5", Pod:"calico-kube-controllers-55db54bcd5-fhbcg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73cf35b117f", MAC:"e2:ed:36:4e:5a:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:24.474718 env[1321]: 2024-02-09 19:39:24.469 [INFO][4333] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5" Namespace="calico-system" Pod="calico-kube-controllers-55db54bcd5-fhbcg" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.490000 audit: BPF prog-id=178 op=LOAD Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4380 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663731666338643232333031623764393064663539383931303464 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4380 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663731666338643232333031623764393064663539383931303464 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit: BPF prog-id=179 op=LOAD Feb 9 19:39:24.491000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00032efb0 items=0 ppid=4380 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663731666338643232333031623764393064663539383931303464 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit: BPF prog-id=180 op=LOAD Feb 9 19:39:24.491000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00032eff8 items=0 ppid=4380 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663731666338643232333031623764393064663539383931303464 Feb 9 19:39:24.491000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:39:24.491000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.491000 audit: BPF prog-id=181 op=LOAD Feb 9 19:39:24.491000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00032f408 items=0 ppid=4380 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663731666338643232333031623764393064663539383931303464 Feb 9 19:39:24.505161 env[1321]: time="2024-02-09T19:39:24.505088018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:24.505419 env[1321]: time="2024-02-09T19:39:24.505374520Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:24.505560 env[1321]: time="2024-02-09T19:39:24.505535420Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:24.505863 env[1321]: time="2024-02-09T19:39:24.505815122Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5 pid=4430 runtime=io.containerd.runc.v2 Feb 9 19:39:24.522535 env[1321]: time="2024-02-09T19:39:24.522482298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mpmzs,Uid:7d41cefc-5827-4c72-a472-2588d552dd8b,Namespace:calico-system,Attempt:1,} returns sandbox id \"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85\"" Feb 9 19:39:24.524980 env[1321]: time="2024-02-09T19:39:24.524944210Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:39:24.535991 systemd[1]: Started cri-containerd-7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5.scope. Feb 9 19:39:24.547000 audit[4462]: NETFILTER_CFG table=filter:118 family=2 entries=42 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:24.547000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffe39a37400 a2=0 a3=7ffe39a373ec items=0 ppid=3822 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.560000 audit: BPF prog-id=182 op=LOAD Feb 9 19:39:24.561000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.561000 audit[4444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4430 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764653335633531616431333835643966376533306162316235663664 Feb 9 19:39:24.561000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.561000 audit[4444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4430 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764653335633531616431333835643966376533306162316235663664 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit: BPF prog-id=183 op=LOAD Feb 9 19:39:24.562000 audit[4444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d06e0 items=0 ppid=4430 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764653335633531616431333835643966376533306162316235663664 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.562000 audit: BPF prog-id=184 op=LOAD Feb 9 19:39:24.562000 audit[4444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d0728 items=0 ppid=4430 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764653335633531616431333835643966376533306162316235663664 Feb 9 19:39:24.563000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:39:24.563000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:24.563000 audit: BPF prog-id=185 op=LOAD Feb 9 19:39:24.563000 audit[4444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d0b38 items=0 ppid=4430 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764653335633531616431333835643966376533306162316235663664 Feb 9 19:39:24.595276 env[1321]: time="2024-02-09T19:39:24.595222432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55db54bcd5-fhbcg,Uid:6c3e4b67-0877-4b7d-b668-9108de84a2f8,Namespace:calico-system,Attempt:1,} returns sandbox id \"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5\"" Feb 9 19:39:24.819536 systemd-networkd[1446]: caliceb1035bd2f: Gained IPv6LL Feb 9 19:39:24.883748 systemd-networkd[1446]: vxlan.calico: Gained IPv6LL Feb 9 19:39:24.916599 env[1321]: time="2024-02-09T19:39:24.916551407Z" level=info msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.954 [WARNING][4492] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"1c291956-25a7-49fb-824d-82207617643e", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba", Pod:"coredns-5d78c9869d-88nsv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliceb1035bd2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.955 [INFO][4492] k8s.go 578: Cleaning up netns ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.955 [INFO][4492] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" iface="eth0" netns="" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.955 [INFO][4492] k8s.go 585: Releasing IP address(es) ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.955 [INFO][4492] utils.go 188: Calico CNI releasing IP address ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.974 [INFO][4499] ipam_plugin.go 415: Releasing address using handleID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.975 [INFO][4499] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.975 [INFO][4499] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.982 [WARNING][4499] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.982 [INFO][4499] ipam_plugin.go 443: Releasing address using workloadID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.984 [INFO][4499] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:24.986518 env[1321]: 2024-02-09 19:39:24.985 [INFO][4492] k8s.go 591: Teardown processing complete. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:24.987348 env[1321]: time="2024-02-09T19:39:24.986560628Z" level=info msg="TearDown network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" successfully" Feb 9 19:39:24.987348 env[1321]: time="2024-02-09T19:39:24.986604228Z" level=info msg="StopPodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" returns successfully" Feb 9 19:39:24.987893 env[1321]: time="2024-02-09T19:39:24.987857434Z" level=info msg="RemovePodSandbox for \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" Feb 9 19:39:24.988040 env[1321]: time="2024-02-09T19:39:24.987899234Z" level=info msg="Forcibly stopping sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\"" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.024 [WARNING][4519] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"1c291956-25a7-49fb-824d-82207617643e", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d08a5027f4385d83524f944dbb8e395ccd2688086f207cc87faa32427ce731ba", Pod:"coredns-5d78c9869d-88nsv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliceb1035bd2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.025 [INFO][4519] k8s.go 578: Cleaning up netns ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.025 [INFO][4519] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" iface="eth0" netns="" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.025 [INFO][4519] k8s.go 585: Releasing IP address(es) ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.025 [INFO][4519] utils.go 188: Calico CNI releasing IP address ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.050 [INFO][4525] ipam_plugin.go 415: Releasing address using handleID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.050 [INFO][4525] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.050 [INFO][4525] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.065 [WARNING][4525] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.081 [INFO][4525] ipam_plugin.go 443: Releasing address using workloadID ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" HandleID="k8s-pod-network.772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--88nsv-eth0" Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.083 [INFO][4525] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.086318 env[1321]: 2024-02-09 19:39:25.084 [INFO][4519] k8s.go 591: Teardown processing complete. ContainerID="772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a" Feb 9 19:39:25.086318 env[1321]: time="2024-02-09T19:39:25.085450379Z" level=info msg="TearDown network for sandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" successfully" Feb 9 19:39:25.110229 env[1321]: time="2024-02-09T19:39:25.110151091Z" level=info msg="RemovePodSandbox \"772554e858b1e957cd54ea626cbad4a39f3b8251e63b2602431eaf5b07118e5a\" returns successfully" Feb 9 19:39:25.110960 env[1321]: time="2024-02-09T19:39:25.110925495Z" level=info msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.148 [WARNING][4543] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2", Pod:"coredns-5d78c9869d-zgbp8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb16a02e91e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.148 [INFO][4543] k8s.go 578: Cleaning up netns ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.148 [INFO][4543] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" iface="eth0" netns="" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.148 [INFO][4543] k8s.go 585: Releasing IP address(es) ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.148 [INFO][4543] utils.go 188: Calico CNI releasing IP address ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.181 [INFO][4549] ipam_plugin.go 415: Releasing address using handleID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.181 [INFO][4549] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.182 [INFO][4549] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.188 [WARNING][4549] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.188 [INFO][4549] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.189 [INFO][4549] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.193654 env[1321]: 2024-02-09 19:39:25.192 [INFO][4543] k8s.go 591: Teardown processing complete. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.194381 env[1321]: time="2024-02-09T19:39:25.193696871Z" level=info msg="TearDown network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" successfully" Feb 9 19:39:25.194381 env[1321]: time="2024-02-09T19:39:25.193748172Z" level=info msg="StopPodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" returns successfully" Feb 9 19:39:25.194381 env[1321]: time="2024-02-09T19:39:25.194144273Z" level=info msg="RemovePodSandbox for \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" Feb 9 19:39:25.194381 env[1321]: time="2024-02-09T19:39:25.194180774Z" level=info msg="Forcibly stopping sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\"" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.230 [WARNING][4568] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5ca0c8c9-0f62-457b-b2c3-ffc0245a5ebb", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"d14b89ac6a5e73b2782131b4eacb9a80f9bf5a450717804c9c8ee65766c356a2", Pod:"coredns-5d78c9869d-zgbp8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb16a02e91e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.230 [INFO][4568] k8s.go 578: Cleaning up netns ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.230 [INFO][4568] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" iface="eth0" netns="" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.230 [INFO][4568] k8s.go 585: Releasing IP address(es) ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.230 [INFO][4568] utils.go 188: Calico CNI releasing IP address ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.255 [INFO][4574] ipam_plugin.go 415: Releasing address using handleID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.255 [INFO][4574] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.255 [INFO][4574] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.263 [WARNING][4574] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.263 [INFO][4574] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" HandleID="k8s-pod-network.16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-coredns--5d78c9869d--zgbp8-eth0" Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.265 [INFO][4574] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.268026 env[1321]: 2024-02-09 19:39:25.266 [INFO][4568] k8s.go 591: Teardown processing complete. ContainerID="16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177" Feb 9 19:39:25.268760 env[1321]: time="2024-02-09T19:39:25.268070710Z" level=info msg="TearDown network for sandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" successfully" Feb 9 19:39:25.276094 env[1321]: time="2024-02-09T19:39:25.276053046Z" level=info msg="RemovePodSandbox \"16dcd71c7557cdfd688961c6cec54c10fe6d548706e383bd07d63351d7155177\" returns successfully" Feb 9 19:39:25.276798 env[1321]: time="2024-02-09T19:39:25.276765249Z" level=info msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.313 [WARNING][4592] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d41cefc-5827-4c72-a472-2588d552dd8b", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85", Pod:"csi-node-driver-mpmzs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliee14f393f5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.313 [INFO][4592] k8s.go 578: Cleaning up netns ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.313 [INFO][4592] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" iface="eth0" netns="" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.313 [INFO][4592] k8s.go 585: Releasing IP address(es) ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.313 [INFO][4592] utils.go 188: Calico CNI releasing IP address ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.333 [INFO][4598] ipam_plugin.go 415: Releasing address using handleID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.333 [INFO][4598] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.334 [INFO][4598] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.339 [WARNING][4598] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.340 [INFO][4598] ipam_plugin.go 443: Releasing address using workloadID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.341 [INFO][4598] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.343887 env[1321]: 2024-02-09 19:39:25.342 [INFO][4592] k8s.go 591: Teardown processing complete. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.343887 env[1321]: time="2024-02-09T19:39:25.343825754Z" level=info msg="TearDown network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" successfully" Feb 9 19:39:25.345878 env[1321]: time="2024-02-09T19:39:25.343863055Z" level=info msg="StopPodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" returns successfully" Feb 9 19:39:25.346448 env[1321]: time="2024-02-09T19:39:25.346373866Z" level=info msg="RemovePodSandbox for \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" Feb 9 19:39:25.346557 env[1321]: time="2024-02-09T19:39:25.346486467Z" level=info msg="Forcibly stopping sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\"" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.381 [WARNING][4617] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7d41cefc-5827-4c72-a472-2588d552dd8b", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85", Pod:"csi-node-driver-mpmzs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliee14f393f5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.381 [INFO][4617] k8s.go 578: Cleaning up netns ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.382 [INFO][4617] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" iface="eth0" netns="" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.382 [INFO][4617] k8s.go 585: Releasing IP address(es) ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.382 [INFO][4617] utils.go 188: Calico CNI releasing IP address ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.400 [INFO][4624] ipam_plugin.go 415: Releasing address using handleID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.400 [INFO][4624] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.400 [INFO][4624] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.406 [WARNING][4624] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.406 [INFO][4624] ipam_plugin.go 443: Releasing address using workloadID ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" HandleID="k8s-pod-network.174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-csi--node--driver--mpmzs-eth0" Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.407 [INFO][4624] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.410035 env[1321]: 2024-02-09 19:39:25.408 [INFO][4617] k8s.go 591: Teardown processing complete. ContainerID="174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67" Feb 9 19:39:25.410742 env[1321]: time="2024-02-09T19:39:25.410066356Z" level=info msg="TearDown network for sandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" successfully" Feb 9 19:39:25.421174 env[1321]: time="2024-02-09T19:39:25.421126006Z" level=info msg="RemovePodSandbox \"174fe4d3c9a7bd2aa6e68dde4be372b5e71f9e2f74bc1ae7066eb25a64884a67\" returns successfully" Feb 9 19:39:25.421825 env[1321]: time="2024-02-09T19:39:25.421789209Z" level=info msg="StopPodSandbox for \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\"" Feb 9 19:39:25.422046 env[1321]: time="2024-02-09T19:39:25.421995410Z" level=info msg="TearDown network for sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" successfully" Feb 9 19:39:25.422046 env[1321]: time="2024-02-09T19:39:25.422038210Z" level=info msg="StopPodSandbox for \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" returns successfully" Feb 9 19:39:25.422470 env[1321]: time="2024-02-09T19:39:25.422440612Z" level=info msg="RemovePodSandbox for \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\"" Feb 9 19:39:25.422612 env[1321]: time="2024-02-09T19:39:25.422571013Z" level=info msg="Forcibly stopping sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\"" Feb 9 19:39:25.422677 env[1321]: time="2024-02-09T19:39:25.422657813Z" level=info msg="TearDown network for sandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" successfully" Feb 9 19:39:25.431806 env[1321]: time="2024-02-09T19:39:25.431767955Z" level=info msg="RemovePodSandbox \"22e8385432cde3f5ee9f7da79a2a74e0c22c931e5f86e4abc0745b59e53fb453\" returns successfully" Feb 9 19:39:25.432165 env[1321]: time="2024-02-09T19:39:25.432140156Z" level=info msg="StopPodSandbox for \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\"" Feb 9 19:39:25.432265 env[1321]: time="2024-02-09T19:39:25.432221757Z" level=info msg="TearDown network for sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" successfully" Feb 9 19:39:25.432329 env[1321]: time="2024-02-09T19:39:25.432265757Z" level=info msg="StopPodSandbox for \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" returns successfully" Feb 9 19:39:25.432603 env[1321]: time="2024-02-09T19:39:25.432575858Z" level=info msg="RemovePodSandbox for \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\"" Feb 9 19:39:25.432691 env[1321]: time="2024-02-09T19:39:25.432606158Z" level=info msg="Forcibly stopping sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\"" Feb 9 19:39:25.432737 env[1321]: time="2024-02-09T19:39:25.432685559Z" level=info msg="TearDown network for sandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" successfully" Feb 9 19:39:25.440408 env[1321]: time="2024-02-09T19:39:25.440362694Z" level=info msg="RemovePodSandbox \"269875922c51aff1b1e13522812f33f4b266ff3ac8bdaa592b857357b84da557\" returns successfully" Feb 9 19:39:25.440800 env[1321]: time="2024-02-09T19:39:25.440753796Z" level=info msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.473 [WARNING][4642] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0", GenerateName:"calico-kube-controllers-55db54bcd5-", Namespace:"calico-system", SelfLink:"", UID:"6c3e4b67-0877-4b7d-b668-9108de84a2f8", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55db54bcd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5", Pod:"calico-kube-controllers-55db54bcd5-fhbcg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73cf35b117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.474 [INFO][4642] k8s.go 578: Cleaning up netns ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.474 [INFO][4642] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" iface="eth0" netns="" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.474 [INFO][4642] k8s.go 585: Releasing IP address(es) ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.474 [INFO][4642] utils.go 188: Calico CNI releasing IP address ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.493 [INFO][4648] ipam_plugin.go 415: Releasing address using handleID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.493 [INFO][4648] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.494 [INFO][4648] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.499 [WARNING][4648] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.499 [INFO][4648] ipam_plugin.go 443: Releasing address using workloadID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.501 [INFO][4648] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.503787 env[1321]: 2024-02-09 19:39:25.502 [INFO][4642] k8s.go 591: Teardown processing complete. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.504422 env[1321]: time="2024-02-09T19:39:25.504361685Z" level=info msg="TearDown network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" successfully" Feb 9 19:39:25.504512 env[1321]: time="2024-02-09T19:39:25.504421985Z" level=info msg="StopPodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" returns successfully" Feb 9 19:39:25.505102 env[1321]: time="2024-02-09T19:39:25.505063688Z" level=info msg="RemovePodSandbox for \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" Feb 9 19:39:25.505230 env[1321]: time="2024-02-09T19:39:25.505107788Z" level=info msg="Forcibly stopping sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\"" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.541 [WARNING][4666] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0", GenerateName:"calico-kube-controllers-55db54bcd5-", Namespace:"calico-system", SelfLink:"", UID:"6c3e4b67-0877-4b7d-b668-9108de84a2f8", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 38, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55db54bcd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5", Pod:"calico-kube-controllers-55db54bcd5-fhbcg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali73cf35b117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.542 [INFO][4666] k8s.go 578: Cleaning up netns ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.542 [INFO][4666] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" iface="eth0" netns="" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.542 [INFO][4666] k8s.go 585: Releasing IP address(es) ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.542 [INFO][4666] utils.go 188: Calico CNI releasing IP address ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.560 [INFO][4672] ipam_plugin.go 415: Releasing address using handleID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.560 [INFO][4672] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.561 [INFO][4672] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.567 [WARNING][4672] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.567 [INFO][4672] ipam_plugin.go 443: Releasing address using workloadID ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" HandleID="k8s-pod-network.97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--kube--controllers--55db54bcd5--fhbcg-eth0" Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.568 [INFO][4672] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:25.570571 env[1321]: 2024-02-09 19:39:25.569 [INFO][4666] k8s.go 591: Teardown processing complete. ContainerID="97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4" Feb 9 19:39:25.571265 env[1321]: time="2024-02-09T19:39:25.570612786Z" level=info msg="TearDown network for sandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" successfully" Feb 9 19:39:25.577735 env[1321]: time="2024-02-09T19:39:25.577640118Z" level=info msg="RemovePodSandbox \"97b1eb349520335bff11bc1b462e0bb4e5a29fa73e5d5bc424b27f24479a2dc4\" returns successfully" Feb 9 19:39:26.100556 systemd-networkd[1446]: cali73cf35b117f: Gained IPv6LL Feb 9 19:39:26.356645 systemd-networkd[1446]: caliee14f393f5c: Gained IPv6LL Feb 9 19:39:26.412182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1153724239.mount: Deactivated successfully. Feb 9 19:39:28.457864 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.YJ8SiF.mount: Deactivated successfully. Feb 9 19:39:28.951103 env[1321]: time="2024-02-09T19:39:28.951047949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:28.957299 env[1321]: time="2024-02-09T19:39:28.957252577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:28.960984 env[1321]: time="2024-02-09T19:39:28.960948393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:28.964879 env[1321]: time="2024-02-09T19:39:28.964851510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:28.965259 env[1321]: time="2024-02-09T19:39:28.965235212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:39:28.966422 env[1321]: time="2024-02-09T19:39:28.966325717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:39:28.968052 env[1321]: time="2024-02-09T19:39:28.968020325Z" level=info msg="CreateContainer within sandbox \"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:39:28.995531 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount494385520.mount: Deactivated successfully. Feb 9 19:39:29.008805 env[1321]: time="2024-02-09T19:39:29.008743905Z" level=info msg="CreateContainer within sandbox \"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3c7d7e8ad37a3410a014325023807aa7e12db2d840ceebe2e95ae76fe99b500c\"" Feb 9 19:39:29.009597 env[1321]: time="2024-02-09T19:39:29.009556709Z" level=info msg="StartContainer for \"3c7d7e8ad37a3410a014325023807aa7e12db2d840ceebe2e95ae76fe99b500c\"" Feb 9 19:39:29.032037 systemd[1]: Started cri-containerd-3c7d7e8ad37a3410a014325023807aa7e12db2d840ceebe2e95ae76fe99b500c.scope. Feb 9 19:39:29.071418 kernel: kauditd_printk_skb: 541 callbacks suppressed Feb 9 19:39:29.071613 kernel: audit: type=1400 audit(1707507569.050:1305): avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4380 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:29.093646 kernel: audit: type=1300 audit(1707507569.050:1305): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4380 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:29.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376437653861643337613334313061303134333235303233383037 Feb 9 19:39:29.117937 kernel: audit: type=1327 audit(1707507569.050:1305): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376437653861643337613334313061303134333235303233383037 Feb 9 19:39:29.119086 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.131448 env[1321]: time="2024-02-09T19:39:29.131390845Z" level=info msg="StartContainer for \"3c7d7e8ad37a3410a014325023807aa7e12db2d840ceebe2e95ae76fe99b500c\" returns successfully" Feb 9 19:39:29.141548 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.154051 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.154131 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.166409 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.179555 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.204455 kernel: audit: type=1400 audit(1707507569.050:1306): avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.050000 audit: BPF prog-id=186 op=LOAD Feb 9 19:39:29.050000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000257bd0 items=0 ppid=4380 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:29.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376437653861643337613334313061303134333235303233383037 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.055000 audit: BPF prog-id=187 op=LOAD Feb 9 19:39:29.055000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000257c18 items=0 ppid=4380 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:29.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376437653861643337613334313061303134333235303233383037 Feb 9 19:39:29.071000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:39:29.071000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { perfmon } for pid=4715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit[4715]: AVC avc: denied { bpf } for pid=4715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:29.071000 audit: BPF prog-id=188 op=LOAD Feb 9 19:39:29.071000 audit[4715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000257ca8 items=0 ppid=4380 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:29.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376437653861643337613334313061303134333235303233383037 Feb 9 19:39:30.875780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3117556245.mount: Deactivated successfully. Feb 9 19:39:33.428919 env[1321]: time="2024-02-09T19:39:33.428840820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:33.437551 env[1321]: time="2024-02-09T19:39:33.437503357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:33.441788 env[1321]: time="2024-02-09T19:39:33.441747875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:33.446482 env[1321]: time="2024-02-09T19:39:33.446450595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:33.447241 env[1321]: time="2024-02-09T19:39:33.447158898Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:39:33.447921 env[1321]: time="2024-02-09T19:39:33.447879901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:39:33.467071 env[1321]: time="2024-02-09T19:39:33.467025383Z" level=info msg="CreateContainer within sandbox \"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:39:33.502070 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2199595936.mount: Deactivated successfully. Feb 9 19:39:33.518721 env[1321]: time="2024-02-09T19:39:33.518680004Z" level=info msg="CreateContainer within sandbox \"7de35c51ad1385d9f7e30ab1b5f6d4013b58a2743dcbe1e7752e74974c471cb5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a\"" Feb 9 19:39:33.521108 env[1321]: time="2024-02-09T19:39:33.519506307Z" level=info msg="StartContainer for \"a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a\"" Feb 9 19:39:33.541722 systemd[1]: Started cri-containerd-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a.scope. Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.558000 audit: BPF prog-id=189 op=LOAD Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4430 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373264313934613734313532626631633865376430306264653561 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4430 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373264313934613734313532626631633865376430306264653561 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit: BPF prog-id=190 op=LOAD Feb 9 19:39:33.559000 audit[4762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000284e00 items=0 ppid=4430 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373264313934613734313532626631633865376430306264653561 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit: BPF prog-id=191 op=LOAD Feb 9 19:39:33.559000 audit[4762]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000284e48 items=0 ppid=4430 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373264313934613734313532626631633865376430306264653561 Feb 9 19:39:33.559000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:39:33.559000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:33.559000 audit: BPF prog-id=192 op=LOAD Feb 9 19:39:33.559000 audit[4762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000285258 items=0 ppid=4430 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373264313934613734313532626631633865376430306264653561 Feb 9 19:39:33.596193 env[1321]: time="2024-02-09T19:39:33.596112835Z" level=info msg="StartContainer for \"a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a\" returns successfully" Feb 9 19:39:34.220137 kubelet[2407]: I0209 19:39:34.219975 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55db54bcd5-fhbcg" podStartSLOduration=40.369739339 podCreationTimestamp="2024-02-09 19:38:45 +0000 UTC" firstStartedPulling="2024-02-09 19:39:24.597488743 +0000 UTC m=+59.889429841" lastFinishedPulling="2024-02-09 19:39:33.447672 +0000 UTC m=+68.739613098" observedRunningTime="2024-02-09 19:39:34.21616298 +0000 UTC m=+69.508104078" watchObservedRunningTime="2024-02-09 19:39:34.219922596 +0000 UTC m=+69.511863694" Feb 9 19:39:35.628985 env[1321]: time="2024-02-09T19:39:35.628924861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:35.638934 env[1321]: time="2024-02-09T19:39:35.638885903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:35.650998 env[1321]: time="2024-02-09T19:39:35.650945253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:35.655640 env[1321]: time="2024-02-09T19:39:35.655598073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:35.656064 env[1321]: time="2024-02-09T19:39:35.656028775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:39:35.658190 env[1321]: time="2024-02-09T19:39:35.658156284Z" level=info msg="CreateContainer within sandbox \"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:39:35.687359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1162793593.mount: Deactivated successfully. Feb 9 19:39:35.700365 env[1321]: time="2024-02-09T19:39:35.699855960Z" level=info msg="CreateContainer within sandbox \"92f71fc8d22301b7d90df5989104dc9d391f3d43eee2b097135314c6194f4d85\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"86d47c694c55d8ef85cec51895ecaddff48c16ae88584185dd4402d900b32e1a\"" Feb 9 19:39:35.701311 env[1321]: time="2024-02-09T19:39:35.701273766Z" level=info msg="StartContainer for \"86d47c694c55d8ef85cec51895ecaddff48c16ae88584185dd4402d900b32e1a\"" Feb 9 19:39:35.729574 systemd[1]: Started cri-containerd-86d47c694c55d8ef85cec51895ecaddff48c16ae88584185dd4402d900b32e1a.scope. Feb 9 19:39:35.771744 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 19:39:35.771947 kernel: audit: type=1400 audit(1707507575.753:1329): avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4380 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:35.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643437633639346335356438656638356365633531383935656361 Feb 9 19:39:35.809217 env[1321]: time="2024-02-09T19:39:35.809166821Z" level=info msg="StartContainer for \"86d47c694c55d8ef85cec51895ecaddff48c16ae88584185dd4402d900b32e1a\" returns successfully" Feb 9 19:39:35.813154 kernel: audit: type=1300 audit(1707507575.753:1329): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4380 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:35.813478 kernel: audit: type=1327 audit(1707507575.753:1329): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643437633639346335356438656638356365633531383935656361 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.839961 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.840124 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.840160 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.858004 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.866419 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.878573 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.902935 kernel: audit: type=1400 audit(1707507575.753:1330): avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.753000 audit: BPF prog-id=193 op=LOAD Feb 9 19:39:35.753000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000374060 items=0 ppid=4380 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:35.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643437633639346335356438656638356365633531383935656361 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit: BPF prog-id=194 op=LOAD Feb 9 19:39:35.771000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028a5f8 items=0 ppid=4380 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:35.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643437633639346335356438656638356365633531383935656361 Feb 9 19:39:35.771000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:39:35.771000 audit: BPF prog-id=193 op=UNLOAD Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:35.771000 audit: BPF prog-id=195 op=LOAD Feb 9 19:39:35.771000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028a688 items=0 ppid=4380 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:35.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643437633639346335356438656638356365633531383935656361 Feb 9 19:39:36.097711 kubelet[2407]: I0209 19:39:36.097672 2407 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:39:36.097711 kubelet[2407]: I0209 19:39:36.097722 2407 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:39:36.222045 kubelet[2407]: I0209 19:39:36.221908 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-mpmzs" podStartSLOduration=41.089834786 podCreationTimestamp="2024-02-09 19:38:44 +0000 UTC" firstStartedPulling="2024-02-09 19:39:24.524368807 +0000 UTC m=+59.816309905" lastFinishedPulling="2024-02-09 19:39:35.656373376 +0000 UTC m=+70.948314574" observedRunningTime="2024-02-09 19:39:36.221244853 +0000 UTC m=+71.513185951" watchObservedRunningTime="2024-02-09 19:39:36.221839455 +0000 UTC m=+71.513780553" Feb 9 19:39:38.127000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:38.127000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8e240 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:38.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:38.132000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:38.132000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8e260 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:38.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:38.133000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:38.133000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a20460 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:38.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:38.136000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:39:38.136000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8e380 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:39:38.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:39:39.001291 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.octIsL.mount: Deactivated successfully. Feb 9 19:39:39.411371 kubelet[2407]: I0209 19:39:39.411320 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:39:39.419234 systemd[1]: Created slice kubepods-besteffort-pod2575c3dd_6b5c_4545_a956_647b36bb67d2.slice. Feb 9 19:39:39.426731 kubelet[2407]: W0209 19:39:39.426700 2407 reflector.go:533] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:39:39.427068 kubelet[2407]: E0209 19:39:39.427051 2407 reflector.go:148] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:39:39.427192 kubelet[2407]: W0209 19:39:39.427014 2407 reflector.go:533] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:39:39.427288 kubelet[2407]: E0209 19:39:39.427277 2407 reflector.go:148] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-e84cdbff2f" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-e84cdbff2f' and this object Feb 9 19:39:39.439092 kubelet[2407]: I0209 19:39:39.439047 2407 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:39:39.445934 systemd[1]: Created slice kubepods-besteffort-poddde91328_6b93_46ba_b559_45006828e7c1.slice. Feb 9 19:39:39.474000 audit[4871]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:39.474000 audit[4871]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffde47ccf60 a2=0 a3=7ffde47ccf4c items=0 ppid=2587 pid=4871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:39.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:39.481212 kubelet[2407]: I0209 19:39:39.481179 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nfnvt\" (UniqueName: \"kubernetes.io/projected/dde91328-6b93-46ba-b559-45006828e7c1-kube-api-access-nfnvt\") pod \"calico-apiserver-79c7f78fc8-j6wqc\" (UID: \"dde91328-6b93-46ba-b559-45006828e7c1\") " pod="calico-apiserver/calico-apiserver-79c7f78fc8-j6wqc" Feb 9 19:39:39.481610 kubelet[2407]: I0209 19:39:39.481590 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q9kxl\" (UniqueName: \"kubernetes.io/projected/2575c3dd-6b5c-4545-a956-647b36bb67d2-kube-api-access-q9kxl\") pod \"calico-apiserver-79c7f78fc8-4m8kk\" (UID: \"2575c3dd-6b5c-4545-a956-647b36bb67d2\") " pod="calico-apiserver/calico-apiserver-79c7f78fc8-4m8kk" Feb 9 19:39:39.481802 kubelet[2407]: I0209 19:39:39.481789 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dde91328-6b93-46ba-b559-45006828e7c1-calico-apiserver-certs\") pod \"calico-apiserver-79c7f78fc8-j6wqc\" (UID: \"dde91328-6b93-46ba-b559-45006828e7c1\") " pod="calico-apiserver/calico-apiserver-79c7f78fc8-j6wqc" Feb 9 19:39:39.481951 kubelet[2407]: I0209 19:39:39.481940 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2575c3dd-6b5c-4545-a956-647b36bb67d2-calico-apiserver-certs\") pod \"calico-apiserver-79c7f78fc8-4m8kk\" (UID: \"2575c3dd-6b5c-4545-a956-647b36bb67d2\") " pod="calico-apiserver/calico-apiserver-79c7f78fc8-4m8kk" Feb 9 19:39:39.477000 audit[4871]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:39.477000 audit[4871]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffde47ccf60 a2=0 a3=7ffde47ccf4c items=0 ppid=2587 pid=4871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:39.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:39.502000 audit[4873]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:39.502000 audit[4873]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc255a4a00 a2=0 a3=7ffc255a49ec items=0 ppid=2587 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:39.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:39.504000 audit[4873]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:39.504000 audit[4873]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc255a4a00 a2=0 a3=7ffc255a49ec items=0 ppid=2587 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:39.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:40.628004 env[1321]: time="2024-02-09T19:39:40.627619391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c7f78fc8-4m8kk,Uid:2575c3dd-6b5c-4545-a956-647b36bb67d2,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:39:40.653426 env[1321]: time="2024-02-09T19:39:40.653155995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c7f78fc8-j6wqc,Uid:dde91328-6b93-46ba-b559-45006828e7c1,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:39:40.881381 systemd-networkd[1446]: calie92f135a81d: Link UP Feb 9 19:39:40.894250 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:39:40.894464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie92f135a81d: link becomes ready Feb 9 19:39:40.894964 systemd-networkd[1446]: calie92f135a81d: Gained carrier Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.766 [INFO][4879] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0 calico-apiserver-79c7f78fc8- calico-apiserver 2575c3dd-6b5c-4545-a956-647b36bb67d2 949 0 2024-02-09 19:39:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c7f78fc8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f calico-apiserver-79c7f78fc8-4m8kk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie92f135a81d [] []}} ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.766 [INFO][4879] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.834 [INFO][4902] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" HandleID="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.846 [INFO][4902] ipam_plugin.go 268: Auto assigning IP ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" HandleID="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfb40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"calico-apiserver-79c7f78fc8-4m8kk", "timestamp":"2024-02-09 19:39:40.834460336 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.846 [INFO][4902] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.846 [INFO][4902] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.846 [INFO][4902] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.848 [INFO][4902] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.853 [INFO][4902] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.859 [INFO][4902] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.860 [INFO][4902] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.862 [INFO][4902] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.863 [INFO][4902] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.864 [INFO][4902] ipam.go 1682: Creating new handle: k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426 Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.867 [INFO][4902] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.872 [INFO][4902] ipam.go 1216: Successfully claimed IPs: [192.168.62.5/26] block=192.168.62.0/26 handle="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.872 [INFO][4902] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.5/26] handle="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.873 [INFO][4902] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:40.908682 env[1321]: 2024-02-09 19:39:40.873 [INFO][4902] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.5/26] IPv6=[] ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" HandleID="k8s-pod-network.2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.874 [INFO][4879] k8s.go 385: Populated endpoint ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0", GenerateName:"calico-apiserver-79c7f78fc8-", Namespace:"calico-apiserver", SelfLink:"", UID:"2575c3dd-6b5c-4545-a956-647b36bb67d2", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 39, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c7f78fc8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"calico-apiserver-79c7f78fc8-4m8kk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie92f135a81d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.875 [INFO][4879] k8s.go 386: Calico CNI using IPs: [192.168.62.5/32] ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.875 [INFO][4879] dataplane_linux.go 68: Setting the host side veth name to calie92f135a81d ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.882 [INFO][4879] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.894 [INFO][4879] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0", GenerateName:"calico-apiserver-79c7f78fc8-", Namespace:"calico-apiserver", SelfLink:"", UID:"2575c3dd-6b5c-4545-a956-647b36bb67d2", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 39, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c7f78fc8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426", Pod:"calico-apiserver-79c7f78fc8-4m8kk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie92f135a81d", MAC:"0a:b6:42:a4:82:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:40.909732 env[1321]: 2024-02-09 19:39:40.906 [INFO][4879] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-4m8kk" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--4m8kk-eth0" Feb 9 19:39:40.954756 systemd-networkd[1446]: cali7bbdafa4ace: Link UP Feb 9 19:39:40.962830 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7bbdafa4ace: link becomes ready Feb 9 19:39:40.962281 systemd-networkd[1446]: cali7bbdafa4ace: Gained carrier Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.780 [INFO][4889] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0 calico-apiserver-79c7f78fc8- calico-apiserver dde91328-6b93-46ba-b559-45006828e7c1 955 0 2024-02-09 19:39:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c7f78fc8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-e84cdbff2f calico-apiserver-79c7f78fc8-j6wqc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7bbdafa4ace [] []}} ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.780 [INFO][4889] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.853 [INFO][4903] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" HandleID="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.864 [INFO][4903] ipam_plugin.go 268: Auto assigning IP ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" HandleID="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-e84cdbff2f", "pod":"calico-apiserver-79c7f78fc8-j6wqc", "timestamp":"2024-02-09 19:39:40.853081412 +0000 UTC"}, Hostname:"ci-3510.3.2-a-e84cdbff2f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.864 [INFO][4903] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.873 [INFO][4903] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.873 [INFO][4903] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-e84cdbff2f' Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.900 [INFO][4903] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.915 [INFO][4903] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.925 [INFO][4903] ipam.go 489: Trying affinity for 192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.928 [INFO][4903] ipam.go 155: Attempting to load block cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.930 [INFO][4903] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.0/26 host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.931 [INFO][4903] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.0/26 handle="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.932 [INFO][4903] ipam.go 1682: Creating new handle: k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.937 [INFO][4903] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.0/26 handle="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.948 [INFO][4903] ipam.go 1216: Successfully claimed IPs: [192.168.62.6/26] block=192.168.62.0/26 handle="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.948 [INFO][4903] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.6/26] handle="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" host="ci-3510.3.2-a-e84cdbff2f" Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.948 [INFO][4903] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:39:40.976425 env[1321]: 2024-02-09 19:39:40.948 [INFO][4903] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.6/26] IPv6=[] ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" HandleID="k8s-pod-network.3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Workload="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.950 [INFO][4889] k8s.go 385: Populated endpoint ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0", GenerateName:"calico-apiserver-79c7f78fc8-", Namespace:"calico-apiserver", SelfLink:"", UID:"dde91328-6b93-46ba-b559-45006828e7c1", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 39, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c7f78fc8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"", Pod:"calico-apiserver-79c7f78fc8-j6wqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7bbdafa4ace", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.950 [INFO][4889] k8s.go 386: Calico CNI using IPs: [192.168.62.6/32] ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.950 [INFO][4889] dataplane_linux.go 68: Setting the host side veth name to cali7bbdafa4ace ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.963 [INFO][4889] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.963 [INFO][4889] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0", GenerateName:"calico-apiserver-79c7f78fc8-", Namespace:"calico-apiserver", SelfLink:"", UID:"dde91328-6b93-46ba-b559-45006828e7c1", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 39, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c7f78fc8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-e84cdbff2f", ContainerID:"3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef", Pod:"calico-apiserver-79c7f78fc8-j6wqc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7bbdafa4ace", MAC:"8e:2b:96:f5:03:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:39:40.977429 env[1321]: 2024-02-09 19:39:40.974 [INFO][4889] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef" Namespace="calico-apiserver" Pod="calico-apiserver-79c7f78fc8-j6wqc" WorkloadEndpoint="ci--3510.3.2--a--e84cdbff2f-k8s-calico--apiserver--79c7f78fc8--j6wqc-eth0" Feb 9 19:39:40.986131 env[1321]: time="2024-02-09T19:39:40.986042155Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:40.986324 env[1321]: time="2024-02-09T19:39:40.986138456Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:40.986324 env[1321]: time="2024-02-09T19:39:40.986178456Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:40.986523 env[1321]: time="2024-02-09T19:39:40.986366457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426 pid=4942 runtime=io.containerd.runc.v2 Feb 9 19:39:41.015991 systemd[1]: Started cri-containerd-2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426.scope. Feb 9 19:39:41.034927 env[1321]: time="2024-02-09T19:39:41.027757825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:39:41.034927 env[1321]: time="2024-02-09T19:39:41.027799725Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:39:41.034927 env[1321]: time="2024-02-09T19:39:41.027813525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:39:41.034927 env[1321]: time="2024-02-09T19:39:41.027973826Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef pid=4978 runtime=io.containerd.runc.v2 Feb 9 19:39:41.043460 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 19:39:41.043595 kernel: audit: type=1325 audit(1707507581.034:1343): table=filter:123 family=2 entries=65 op=nft_register_chain pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:41.034000 audit[4986]: NETFILTER_CFG table=filter:123 family=2 entries=65 op=nft_register_chain pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:41.034000 audit[4986]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffe85d18a30 a2=0 a3=7ffe85d18a1c items=0 ppid=3822 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.080505 kernel: audit: type=1300 audit(1707507581.034:1343): arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffe85d18a30 a2=0 a3=7ffe85d18a1c items=0 ppid=3822 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.100416 kernel: audit: type=1327 audit(1707507581.034:1343): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:41.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.118039 kernel: audit: type=1400 audit(1707507581.050:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.122746 systemd[1]: Started cri-containerd-3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef.scope. Feb 9 19:39:41.134664 kernel: audit: type=1400 audit(1707507581.050:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.150555 kernel: audit: type=1400 audit(1707507581.050:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.166875 kernel: audit: type=1400 audit(1707507581.050:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.189162 env[1321]: time="2024-02-09T19:39:41.184155761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c7f78fc8-4m8kk,Uid:2575c3dd-6b5c-4545-a956-647b36bb67d2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426\"" Feb 9 19:39:41.189162 env[1321]: time="2024-02-09T19:39:41.188379878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:39:41.191238 kernel: audit: type=1400 audit(1707507581.050:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.206627 kernel: audit: type=1400 audit(1707507581.050:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.206708 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit: BPF prog-id=196 op=LOAD Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306662636634393333333461623864633766366137613639313030 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306662636634393333333461623864633766366137613639313030 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit: BPF prog-id=197 op=LOAD Feb 9 19:39:41.053000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00022c230 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306662636634393333333461623864633766366137613639313030 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.053000 audit: BPF prog-id=198 op=LOAD Feb 9 19:39:41.053000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00022c278 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306662636634393333333461623864633766366137613639313030 Feb 9 19:39:41.054000 audit: BPF prog-id=198 op=UNLOAD Feb 9 19:39:41.054000 audit: BPF prog-id=197 op=UNLOAD Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.054000 audit: BPF prog-id=199 op=LOAD Feb 9 19:39:41.054000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00022c688 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306662636634393333333461623864633766366137613639313030 Feb 9 19:39:41.183000 audit[5005]: NETFILTER_CFG table=filter:124 family=2 entries=52 op=nft_register_chain pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:39:41.183000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=26144 a0=3 a1=7ffdd3f153d0 a2=0 a3=7ffdd3f153bc items=0 ppid=3822 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.183000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:39:41.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit: BPF prog-id=200 op=LOAD Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4978 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373264323533633766356635386536386462386538356134336438 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4978 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373264323533633766356635386536386462386538356134336438 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit: BPF prog-id=201 op=LOAD Feb 9 19:39:41.210000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022ada0 items=0 ppid=4978 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373264323533633766356635386536386462386538356134336438 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.210000 audit: BPF prog-id=202 op=LOAD Feb 9 19:39:41.210000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022ade8 items=0 ppid=4978 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373264323533633766356635386536386462386538356134336438 Feb 9 19:39:41.211000 audit: BPF prog-id=202 op=UNLOAD Feb 9 19:39:41.211000 audit: BPF prog-id=201 op=UNLOAD Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:41.211000 audit: BPF prog-id=203 op=LOAD Feb 9 19:39:41.211000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022b1f8 items=0 ppid=4978 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:41.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366373264323533633766356635386536386462386538356134336438 Feb 9 19:39:41.248526 env[1321]: time="2024-02-09T19:39:41.248476322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c7f78fc8-j6wqc,Uid:dde91328-6b93-46ba-b559-45006828e7c1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef\"" Feb 9 19:39:42.355684 systemd-networkd[1446]: cali7bbdafa4ace: Gained IPv6LL Feb 9 19:39:42.356161 systemd-networkd[1446]: calie92f135a81d: Gained IPv6LL Feb 9 19:39:46.563263 env[1321]: time="2024-02-09T19:39:46.563203931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:46.568505 env[1321]: time="2024-02-09T19:39:46.568461652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:46.573016 env[1321]: time="2024-02-09T19:39:46.572980670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:46.577173 env[1321]: time="2024-02-09T19:39:46.577141187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:46.578111 env[1321]: time="2024-02-09T19:39:46.578078390Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:39:46.580818 env[1321]: time="2024-02-09T19:39:46.580793101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:39:46.581895 env[1321]: time="2024-02-09T19:39:46.581828805Z" level=info msg="CreateContainer within sandbox \"2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:39:46.621878 env[1321]: time="2024-02-09T19:39:46.621808063Z" level=info msg="CreateContainer within sandbox \"2c0fbcf493334ab8dc7f6a7a69100a4f188e24cf1f360a7e38e77a73f2557426\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765\"" Feb 9 19:39:46.622882 env[1321]: time="2024-02-09T19:39:46.622839867Z" level=info msg="StartContainer for \"9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765\"" Feb 9 19:39:46.654292 systemd[1]: Started cri-containerd-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765.scope. Feb 9 19:39:46.705999 kernel: kauditd_printk_skb: 112 callbacks suppressed Feb 9 19:39:46.706193 kernel: audit: type=1400 audit(1707507586.687:1380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.740905 kernel: audit: type=1400 audit(1707507586.687:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.741133 kernel: audit: type=1400 audit(1707507586.687:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.756627 kernel: audit: type=1400 audit(1707507586.687:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.790082 kernel: audit: type=1400 audit(1707507586.687:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.790326 kernel: audit: type=1400 audit(1707507586.687:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.805458 kernel: audit: type=1400 audit(1707507586.687:1386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.819510 kernel: audit: type=1400 audit(1707507586.687:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.836468 kernel: audit: type=1400 audit(1707507586.687:1388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.850870 env[1321]: time="2024-02-09T19:39:46.850094666Z" level=info msg="StartContainer for \"9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765\" returns successfully" Feb 9 19:39:46.711000 audit: BPF prog-id=204 op=LOAD Feb 9 19:39:46.712000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.712000 audit[5047]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4942 pid=5047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:46.851489 kernel: audit: type=1400 audit(1707507586.711:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313235313566306438643061323366333030663833396330623836 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4942 pid=5047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313235313566306438643061323366333030663833396330623836 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit: BPF prog-id=205 op=LOAD Feb 9 19:39:46.713000 audit[5047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000265b40 items=0 ppid=4942 pid=5047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313235313566306438643061323366333030663833396330623836 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit: BPF prog-id=206 op=LOAD Feb 9 19:39:46.713000 audit[5047]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000265b88 items=0 ppid=4942 pid=5047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313235313566306438643061323366333030663833396330623836 Feb 9 19:39:46.713000 audit: BPF prog-id=206 op=UNLOAD Feb 9 19:39:46.713000 audit: BPF prog-id=205 op=UNLOAD Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { perfmon } for pid=5047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit[5047]: AVC avc: denied { bpf } for pid=5047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:46.713000 audit: BPF prog-id=207 op=LOAD Feb 9 19:39:46.713000 audit[5047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000265f98 items=0 ppid=4942 pid=5047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313235313566306438643061323366333030663833396330623836 Feb 9 19:39:47.146518 env[1321]: time="2024-02-09T19:39:47.146370835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:47.155115 env[1321]: time="2024-02-09T19:39:47.155060069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:47.160276 env[1321]: time="2024-02-09T19:39:47.160219889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:47.165584 env[1321]: time="2024-02-09T19:39:47.165534010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:39:47.165969 env[1321]: time="2024-02-09T19:39:47.165928112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:39:47.169626 env[1321]: time="2024-02-09T19:39:47.169581626Z" level=info msg="CreateContainer within sandbox \"3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:39:47.205702 env[1321]: time="2024-02-09T19:39:47.205640568Z" level=info msg="CreateContainer within sandbox \"3f72d253c7f5f58e68db8e85a43d8528385d6deebad53ea74fd9d9f697424bef\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c\"" Feb 9 19:39:47.206647 env[1321]: time="2024-02-09T19:39:47.206601872Z" level=info msg="StartContainer for \"a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c\"" Feb 9 19:39:47.238341 systemd[1]: Started cri-containerd-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c.scope. Feb 9 19:39:47.258331 kubelet[2407]: I0209 19:39:47.258281 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c7f78fc8-4m8kk" podStartSLOduration=2.866277254 podCreationTimestamp="2024-02-09 19:39:39 +0000 UTC" firstStartedPulling="2024-02-09 19:39:41.187696075 +0000 UTC m=+76.479637173" lastFinishedPulling="2024-02-09 19:39:46.579646196 +0000 UTC m=+81.871587294" observedRunningTime="2024-02-09 19:39:47.258198975 +0000 UTC m=+82.550140173" watchObservedRunningTime="2024-02-09 19:39:47.258227375 +0000 UTC m=+82.550168473" Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit: BPF prog-id=208 op=LOAD Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4978 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613462333434343135383037633234353965313838653865646162 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4978 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613462333434343135383037633234353965313838653865646162 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit: BPF prog-id=209 op=LOAD Feb 9 19:39:47.272000 audit[5085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fceb0 items=0 ppid=4978 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613462333434343135383037633234353965313838653865646162 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.272000 audit: BPF prog-id=210 op=LOAD Feb 9 19:39:47.272000 audit[5085]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fcef8 items=0 ppid=4978 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613462333434343135383037633234353965313838653865646162 Feb 9 19:39:47.273000 audit: BPF prog-id=210 op=UNLOAD Feb 9 19:39:47.273000 audit: BPF prog-id=209 op=UNLOAD Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { perfmon } for pid=5085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit[5085]: AVC avc: denied { bpf } for pid=5085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:39:47.273000 audit: BPF prog-id=211 op=LOAD Feb 9 19:39:47.273000 audit[5085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fd308 items=0 ppid=4978 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613462333434343135383037633234353965313838653865646162 Feb 9 19:39:47.295000 audit[5102]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=5102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:47.295000 audit[5102]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdb70991c0 a2=0 a3=7ffdb70991ac items=0 ppid=2587 pid=5102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:47.299000 audit[5102]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=5102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:47.299000 audit[5102]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdb70991c0 a2=0 a3=7ffdb70991ac items=0 ppid=2587 pid=5102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:47.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:47.347514 env[1321]: time="2024-02-09T19:39:47.347459026Z" level=info msg="StartContainer for \"a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c\" returns successfully" Feb 9 19:39:47.849000 audit[5059]: AVC avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:39:47.849000 audit[5059]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b6d040 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:39:47.849000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:39:47.918000 audit[5095]: AVC avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:39:47.918000 audit[5095]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c76bc0 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:39:47.918000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:39:48.256144 kubelet[2407]: I0209 19:39:48.255543 2407 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c7f78fc8-j6wqc" podStartSLOduration=3.338136906 podCreationTimestamp="2024-02-09 19:39:39 +0000 UTC" firstStartedPulling="2024-02-09 19:39:41.249922728 +0000 UTC m=+76.541863926" lastFinishedPulling="2024-02-09 19:39:47.167283117 +0000 UTC m=+82.459224215" observedRunningTime="2024-02-09 19:39:48.255357794 +0000 UTC m=+83.547298892" watchObservedRunningTime="2024-02-09 19:39:48.255497195 +0000 UTC m=+83.547438293" Feb 9 19:39:48.270000 audit[5117]: NETFILTER_CFG table=filter:127 family=2 entries=10 op=nft_register_rule pid=5117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:48.270000 audit[5117]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffedba48600 a2=0 a3=7ffedba485ec items=0 ppid=2587 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:48.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:48.271000 audit[5117]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=5117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:39:48.271000 audit[5117]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffedba48600 a2=0 a3=7ffedba485ec items=0 ppid=2587 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:48.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:39:58.461885 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.OTPb5m.mount: Deactivated successfully. Feb 9 19:40:10.655865 systemd[1]: run-containerd-runc-k8s.io-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765-runc.6tcagn.mount: Deactivated successfully. Feb 9 19:40:10.714349 systemd[1]: run-containerd-runc-k8s.io-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c-runc.8hb4q7.mount: Deactivated successfully. Feb 9 19:40:10.794000 audit[5233]: NETFILTER_CFG table=filter:129 family=2 entries=9 op=nft_register_rule pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.800046 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 19:40:10.800176 kernel: audit: type=1325 audit(1707507610.794:1422): table=filter:129 family=2 entries=9 op=nft_register_rule pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.794000 audit[5233]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff0b54fcf0 a2=0 a3=7fff0b54fcdc items=0 ppid=2587 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.829832 kernel: audit: type=1300 audit(1707507610.794:1422): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff0b54fcf0 a2=0 a3=7fff0b54fcdc items=0 ppid=2587 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.841155 kernel: audit: type=1327 audit(1707507610.794:1422): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.841311 kernel: audit: type=1325 audit(1707507610.828:1423): table=nat:130 family=2 entries=27 op=nft_register_chain pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.828000 audit[5233]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=5233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.852808 kernel: audit: type=1300 audit(1707507610.828:1423): arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fff0b54fcf0 a2=0 a3=7fff0b54fcdc items=0 ppid=2587 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.828000 audit[5233]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fff0b54fcf0 a2=0 a3=7fff0b54fcdc items=0 ppid=2587 pid=5233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.849000 audit[5235]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.883475 kernel: audit: type=1327 audit(1707507610.828:1423): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.883517 kernel: audit: type=1325 audit(1707507610.849:1424): table=filter:131 family=2 entries=8 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.849000 audit[5235]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd110cdc90 a2=0 a3=7ffd110cdc7c items=0 ppid=2587 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.914997 kernel: audit: type=1300 audit(1707507610.849:1424): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd110cdc90 a2=0 a3=7ffd110cdc7c items=0 ppid=2587 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.915981 kernel: audit: type=1327 audit(1707507610.849:1424): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:10.914000 audit[5235]: NETFILTER_CFG table=nat:132 family=2 entries=34 op=nft_register_chain pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.936158 kernel: audit: type=1325 audit(1707507610.914:1425): table=nat:132 family=2 entries=34 op=nft_register_chain pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:40:10.914000 audit[5235]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffd110cdc90 a2=0 a3=7ffd110cdc7c items=0 ppid=2587 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:10.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:40:21.240000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.245349 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:40:21.245484 kernel: audit: type=1400 audit(1707507621.240:1426): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.240000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00132cf30 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:21.283732 kernel: audit: type=1300 audit(1707507621.240:1426): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00132cf30 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:21.283851 kernel: audit: type=1327 audit(1707507621.240:1426): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:21.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:21.240000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.303418 kernel: audit: type=1400 audit(1707507621.240:1427): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.318417 kernel: audit: type=1300 audit(1707507621.240:1427): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001651dc0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:21.240000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001651dc0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:21.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:21.357044 kernel: audit: type=1327 audit(1707507621.240:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:21.676000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.676000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.712031 kernel: audit: type=1400 audit(1707507621.676:1429): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.712186 kernel: audit: type=1400 audit(1707507621.676:1428): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.712222 kernel: audit: type=1300 audit(1707507621.676:1428): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0111cc450 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.676000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0111cc450 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.732589 kernel: audit: type=1327 audit(1707507621.676:1428): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.676000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.676000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0111cc480 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.676000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.676000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0111cc600 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.676000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00f71b320 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.693000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.693000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c012584120 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:21.693000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:21.693000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c014235410 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:40:21.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:40:28.469129 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.3cDy7h.mount: Deactivated successfully. Feb 9 19:40:38.130000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.135856 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 19:40:38.135980 kernel: audit: type=1400 audit(1707507638.130:1434): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.130000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f40a40 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.174375 kernel: audit: type=1300 audit(1707507638.130:1434): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f40a40 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.174523 kernel: audit: type=1327 audit(1707507638.130:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.130000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.133000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.133000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f40a60 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.209418 kernel: audit: type=1400 audit(1707507638.133:1435): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.209472 kernel: audit: type=1300 audit(1707507638.133:1435): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f40a60 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.231416 kernel: audit: type=1327 audit(1707507638.133:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.134000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.249416 kernel: audit: type=1400 audit(1707507638.134:1436): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.134000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea1060 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.287325 kernel: audit: type=1300 audit(1707507638.134:1436): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea1060 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.134000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.306073 kernel: audit: type=1327 audit(1707507638.134:1436): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.306192 kernel: audit: type=1400 audit(1707507638.137:1437): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.137000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:40:38.137000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea11c0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:40:38.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:40:38.988561 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.W6MDYY.mount: Deactivated successfully. Feb 9 19:40:40.654869 systemd[1]: run-containerd-runc-k8s.io-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765-runc.AGUKQE.mount: Deactivated successfully. Feb 9 19:40:40.686932 systemd[1]: run-containerd-runc-k8s.io-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c-runc.U9HXUh.mount: Deactivated successfully. Feb 9 19:40:47.850000 audit[5059]: AVC avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:40:47.855339 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:40:47.855455 kernel: audit: type=1400 audit(1707507647.850:1438): avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:40:47.850000 audit[5059]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00139ea60 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:40:47.893480 kernel: audit: type=1300 audit(1707507647.850:1438): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00139ea60 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:40:47.893643 kernel: audit: type=1327 audit(1707507647.850:1438): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:40:47.850000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:40:47.920000 audit[5095]: AVC avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:40:47.920000 audit[5095]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d4d360 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:40:47.959401 kernel: audit: type=1400 audit(1707507647.920:1439): avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:40:47.959548 kernel: audit: type=1300 audit(1707507647.920:1439): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d4d360 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:40:47.959582 kernel: audit: type=1327 audit(1707507647.920:1439): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:40:47.920000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:40:53.977551 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.FbmzHV.mount: Deactivated successfully. Feb 9 19:40:57.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.12:22-10.200.12.6:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:57.339433 systemd[1]: Started sshd@7-10.200.8.12:22-10.200.12.6:43380.service. Feb 9 19:40:57.356420 kernel: audit: type=1130 audit(1707507657.339:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.12:22-10.200.12.6:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:57.953000 audit[5370]: USER_ACCT pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.954427 sshd[5370]: Accepted publickey for core from 10.200.12.6 port 43380 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:57.973318 sshd[5370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:57.972000 audit[5370]: CRED_ACQ pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.979242 systemd[1]: Started session-10.scope. Feb 9 19:40:57.980357 systemd-logind[1284]: New session 10 of user core. Feb 9 19:40:57.990663 kernel: audit: type=1101 audit(1707507657.953:1441): pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.990761 kernel: audit: type=1103 audit(1707507657.972:1442): pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.991411 kernel: audit: type=1006 audit(1707507657.972:1443): pid=5370 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:40:57.972000 audit[5370]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddf795ac0 a2=3 a3=0 items=0 ppid=1 pid=5370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.001417 kernel: audit: type=1300 audit(1707507657.972:1443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddf795ac0 a2=3 a3=0 items=0 ppid=1 pid=5370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:57.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:40:58.023368 kernel: audit: type=1327 audit(1707507657.972:1443): proctitle=737368643A20636F7265205B707269765D Feb 9 19:40:58.023473 kernel: audit: type=1105 audit(1707507657.985:1444): pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.985000 audit[5370]: USER_START pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.988000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.042413 kernel: audit: type=1103 audit(1707507657.988:1445): pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.462560 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.qVmZeA.mount: Deactivated successfully. Feb 9 19:40:58.542638 sshd[5370]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:58.543000 audit[5370]: USER_END pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.545952 systemd[1]: sshd@7-10.200.8.12:22-10.200.12.6:43380.service: Deactivated successfully. Feb 9 19:40:58.546831 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:40:58.548131 systemd-logind[1284]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:40:58.549092 systemd-logind[1284]: Removed session 10. Feb 9 19:40:58.543000 audit[5370]: CRED_DISP pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.578460 kernel: audit: type=1106 audit(1707507658.543:1446): pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.578607 kernel: audit: type=1104 audit(1707507658.543:1447): pid=5370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:58.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.12:22-10.200.12.6:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.649237 systemd[1]: Started sshd@8-10.200.8.12:22-10.200.12.6:43384.service. Feb 9 19:41:03.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.12:22-10.200.12.6:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.654509 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:41:03.654612 kernel: audit: type=1130 audit(1707507663.648:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.12:22-10.200.12.6:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:04.263000 audit[5407]: USER_ACCT pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.266819 sshd[5407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:04.284738 kernel: audit: type=1101 audit(1707507664.263:1450): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.284788 sshd[5407]: Accepted publickey for core from 10.200.12.6 port 43384 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:04.263000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.290781 systemd-logind[1284]: New session 11 of user core. Feb 9 19:41:04.291437 systemd[1]: Started session-11.scope. Feb 9 19:41:04.307500 kernel: audit: type=1103 audit(1707507664.263:1451): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.307637 kernel: audit: type=1006 audit(1707507664.263:1452): pid=5407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:41:04.263000 audit[5407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6dcac330 a2=3 a3=0 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.316417 kernel: audit: type=1300 audit(1707507664.263:1452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6dcac330 a2=3 a3=0 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:04.339456 kernel: audit: type=1327 audit(1707507664.263:1452): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:04.339599 kernel: audit: type=1105 audit(1707507664.298:1453): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.298000 audit[5407]: USER_START pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.303000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.360416 kernel: audit: type=1103 audit(1707507664.303:1454): pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.776298 sshd[5407]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:04.776000 audit[5407]: USER_END pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.779839 systemd[1]: sshd@8-10.200.8.12:22-10.200.12.6:43384.service: Deactivated successfully. Feb 9 19:41:04.780803 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:41:04.782633 systemd-logind[1284]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:41:04.783682 systemd-logind[1284]: Removed session 11. Feb 9 19:41:04.776000 audit[5407]: CRED_DISP pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.813745 kernel: audit: type=1106 audit(1707507664.776:1455): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.813898 kernel: audit: type=1104 audit(1707507664.776:1456): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:04.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.12:22-10.200.12.6:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:08.982311 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.YeWE6q.mount: Deactivated successfully. Feb 9 19:41:09.906041 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:41:09.906202 kernel: audit: type=1130 audit(1707507669.882:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.12:22-10.200.12.6:46326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:09.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.12:22-10.200.12.6:46326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:09.883997 systemd[1]: Started sshd@9-10.200.8.12:22-10.200.12.6:46326.service. Feb 9 19:41:10.502000 audit[5441]: USER_ACCT pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.522800 sshd[5441]: Accepted publickey for core from 10.200.12.6 port 46326 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:10.521000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.523244 sshd[5441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:10.529349 systemd[1]: Started session-12.scope. Feb 9 19:41:10.530740 systemd-logind[1284]: New session 12 of user core. Feb 9 19:41:10.540547 kernel: audit: type=1101 audit(1707507670.502:1459): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.540657 kernel: audit: type=1103 audit(1707507670.521:1460): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.540690 kernel: audit: type=1006 audit(1707507670.521:1461): pid=5441 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:41:10.521000 audit[5441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc35ceece0 a2=3 a3=0 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:10.567893 kernel: audit: type=1300 audit(1707507670.521:1461): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc35ceece0 a2=3 a3=0 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:10.568550 kernel: audit: type=1327 audit(1707507670.521:1461): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:10.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:10.532000 audit[5441]: USER_START pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.574499 kernel: audit: type=1105 audit(1707507670.532:1462): pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.537000 audit[5443]: CRED_ACQ pid=5443 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.607741 kernel: audit: type=1103 audit(1707507670.537:1463): pid=5443 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:10.650004 systemd[1]: run-containerd-runc-k8s.io-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765-runc.NHnghW.mount: Deactivated successfully. Feb 9 19:41:10.685009 systemd[1]: run-containerd-runc-k8s.io-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c-runc.aoguaP.mount: Deactivated successfully. Feb 9 19:41:11.007974 sshd[5441]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:11.009000 audit[5441]: USER_END pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:11.012068 systemd[1]: sshd@9-10.200.8.12:22-10.200.12.6:46326.service: Deactivated successfully. Feb 9 19:41:11.013082 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:41:11.014925 systemd-logind[1284]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:41:11.015873 systemd-logind[1284]: Removed session 12. Feb 9 19:41:11.009000 audit[5441]: CRED_DISP pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:11.045483 kernel: audit: type=1106 audit(1707507671.009:1464): pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:11.045635 kernel: audit: type=1104 audit(1707507671.009:1465): pid=5441 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:11.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.12:22-10.200.12.6:46326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:16.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.12:22-10.200.12.6:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:16.113676 systemd[1]: Started sshd@10-10.200.8.12:22-10.200.12.6:46338.service. Feb 9 19:41:16.118754 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:41:16.118860 kernel: audit: type=1130 audit(1707507676.113:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.12:22-10.200.12.6:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:16.730000 audit[5494]: USER_ACCT pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.731560 sshd[5494]: Accepted publickey for core from 10.200.12.6 port 46338 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:16.749000 audit[5494]: CRED_ACQ pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.750629 sshd[5494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:16.757018 systemd[1]: Started session-13.scope. Feb 9 19:41:16.758338 systemd-logind[1284]: New session 13 of user core. Feb 9 19:41:16.768507 kernel: audit: type=1101 audit(1707507676.730:1468): pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.768647 kernel: audit: type=1103 audit(1707507676.749:1469): pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.768676 kernel: audit: type=1006 audit(1707507676.749:1470): pid=5494 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 19:41:16.749000 audit[5494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21f23ad0 a2=3 a3=0 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:16.798485 kernel: audit: type=1300 audit(1707507676.749:1470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21f23ad0 a2=3 a3=0 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:16.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:16.804708 kernel: audit: type=1327 audit(1707507676.749:1470): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:16.804807 kernel: audit: type=1105 audit(1707507676.770:1471): pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.770000 audit[5494]: USER_START pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.776000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:16.838429 kernel: audit: type=1103 audit(1707507676.776:1472): pid=5496 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.257619 sshd[5494]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:17.259000 audit[5494]: USER_END pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.261643 systemd-logind[1284]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:41:17.263170 systemd[1]: sshd@10-10.200.8.12:22-10.200.12.6:46338.service: Deactivated successfully. Feb 9 19:41:17.264027 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:41:17.265781 systemd-logind[1284]: Removed session 13. Feb 9 19:41:17.259000 audit[5494]: CRED_DISP pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.280422 kernel: audit: type=1106 audit(1707507677.259:1473): pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.280473 kernel: audit: type=1104 audit(1707507677.259:1474): pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.12:22-10.200.12.6:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:17.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.12:22-10.200.12.6:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:17.364962 systemd[1]: Started sshd@11-10.200.8.12:22-10.200.12.6:47662.service. Feb 9 19:41:17.986000 audit[5508]: USER_ACCT pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.987542 sshd[5508]: Accepted publickey for core from 10.200.12.6 port 47662 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:17.988000 audit[5508]: CRED_ACQ pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:17.988000 audit[5508]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14ca7670 a2=3 a3=0 items=0 ppid=1 pid=5508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:17.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:17.989474 sshd[5508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:17.994610 systemd-logind[1284]: New session 14 of user core. Feb 9 19:41:17.995131 systemd[1]: Started session-14.scope. Feb 9 19:41:17.999000 audit[5508]: USER_START pid=5508 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:18.001000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:19.462310 sshd[5508]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:19.463000 audit[5508]: USER_END pid=5508 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:19.464000 audit[5508]: CRED_DISP pid=5508 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:19.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.12:22-10.200.12.6:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:19.466313 systemd-logind[1284]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:41:19.466560 systemd[1]: sshd@11-10.200.8.12:22-10.200.12.6:47662.service: Deactivated successfully. Feb 9 19:41:19.467531 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:41:19.468714 systemd-logind[1284]: Removed session 14. Feb 9 19:41:19.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.12:22-10.200.12.6:47670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:19.567327 systemd[1]: Started sshd@12-10.200.8.12:22-10.200.12.6:47670.service. Feb 9 19:41:20.179000 audit[5520]: USER_ACCT pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.181227 sshd[5520]: Accepted publickey for core from 10.200.12.6 port 47670 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:20.181000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.181000 audit[5520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0fd79c50 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:20.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:20.183549 sshd[5520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:20.189121 systemd[1]: Started session-15.scope. Feb 9 19:41:20.189605 systemd-logind[1284]: New session 15 of user core. Feb 9 19:41:20.192000 audit[5520]: USER_START pid=5520 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.194000 audit[5522]: CRED_ACQ pid=5522 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.678309 sshd[5520]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:20.678000 audit[5520]: USER_END pid=5520 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.678000 audit[5520]: CRED_DISP pid=5520 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:20.681979 systemd[1]: sshd@12-10.200.8.12:22-10.200.12.6:47670.service: Deactivated successfully. Feb 9 19:41:20.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.12:22-10.200.12.6:47670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:20.683083 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:41:20.683816 systemd-logind[1284]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:41:20.684695 systemd-logind[1284]: Removed session 15. Feb 9 19:41:21.241000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.246244 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:41:21.246385 kernel: audit: type=1400 audit(1707507681.241:1494): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.241000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fb8ea0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:21.284668 kernel: audit: type=1300 audit(1707507681.241:1494): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fb8ea0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:21.284841 kernel: audit: type=1327 audit(1707507681.241:1494): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:21.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:21.241000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.318729 kernel: audit: type=1400 audit(1707507681.241:1495): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.318867 kernel: audit: type=1300 audit(1707507681.241:1495): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015ecce0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:21.241000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015ecce0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:21.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:21.359268 kernel: audit: type=1327 audit(1707507681.241:1495): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:21.677000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.697424 kernel: audit: type=1400 audit(1707507681.677:1496): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.677000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.714425 kernel: audit: type=1400 audit(1707507681.677:1497): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.677000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ba58a50 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.736418 kernel: audit: type=1300 audit(1707507681.677:1497): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ba58a50 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.736512 kernel: audit: type=1327 audit(1707507681.677:1497): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.677000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00b87e750 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.677000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.677000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00ba58ba0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.677000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.677000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0117e1aa0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.696000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.696000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00ba58c90 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:21.696000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:21.696000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00817a200 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:41:21.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:41:25.784999 systemd[1]: Started sshd@13-10.200.8.12:22-10.200.12.6:47684.service. Feb 9 19:41:25.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.12:22-10.200.12.6:47684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.419000 audit[5534]: USER_ACCT pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.421328 sshd[5534]: Accepted publickey for core from 10.200.12.6 port 47684 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:26.425620 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 9 19:41:26.425723 kernel: audit: type=1101 audit(1707507686.419:1503): pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.426278 sshd[5534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:26.431697 systemd-logind[1284]: New session 16 of user core. Feb 9 19:41:26.433180 systemd[1]: Started session-16.scope. Feb 9 19:41:26.424000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.460459 kernel: audit: type=1103 audit(1707507686.424:1504): pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.460587 kernel: audit: type=1006 audit(1707507686.424:1505): pid=5534 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:41:26.424000 audit[5534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe40a19230 a2=3 a3=0 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:26.489804 kernel: audit: type=1300 audit(1707507686.424:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe40a19230 a2=3 a3=0 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:26.491365 kernel: audit: type=1327 audit(1707507686.424:1505): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:26.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:26.437000 audit[5534]: USER_START pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.535140 kernel: audit: type=1105 audit(1707507686.437:1506): pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.535301 kernel: audit: type=1103 audit(1707507686.439:1507): pid=5536 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.439000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.923607 sshd[5534]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:26.923000 audit[5534]: USER_END pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.928339 systemd[1]: sshd@13-10.200.8.12:22-10.200.12.6:47684.service: Deactivated successfully. Feb 9 19:41:26.929200 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:41:26.932825 systemd-logind[1284]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:41:26.933758 systemd-logind[1284]: Removed session 16. Feb 9 19:41:26.924000 audit[5534]: CRED_DISP pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.944432 kernel: audit: type=1106 audit(1707507686.923:1508): pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.944489 kernel: audit: type=1104 audit(1707507686.924:1509): pid=5534 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:26.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.12:22-10.200.12.6:47684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.974678 kernel: audit: type=1131 audit(1707507686.927:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.12:22-10.200.12.6:47684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:28.461351 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.MWbttB.mount: Deactivated successfully. Feb 9 19:41:32.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.12:22-10.200.12.6:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:32.048448 kernel: audit: type=1130 audit(1707507692.030:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.12:22-10.200.12.6:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:32.031235 systemd[1]: Started sshd@14-10.200.8.12:22-10.200.12.6:60820.service. Feb 9 19:41:32.650000 audit[5571]: USER_ACCT pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.670530 kernel: audit: type=1101 audit(1707507692.650:1512): pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.654113 sshd[5571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:32.670980 sshd[5571]: Accepted publickey for core from 10.200.12.6 port 60820 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:32.652000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.690761 kernel: audit: type=1103 audit(1707507692.652:1513): pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.690974 systemd-logind[1284]: New session 17 of user core. Feb 9 19:41:32.691014 systemd[1]: Started session-17.scope. Feb 9 19:41:32.703428 kernel: audit: type=1006 audit(1707507692.652:1514): pid=5571 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:41:32.652000 audit[5571]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96151e60 a2=3 a3=0 items=0 ppid=1 pid=5571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.721626 kernel: audit: type=1300 audit(1707507692.652:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96151e60 a2=3 a3=0 items=0 ppid=1 pid=5571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.721739 kernel: audit: type=1327 audit(1707507692.652:1514): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:32.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:32.728737 kernel: audit: type=1105 audit(1707507692.697:1515): pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.697000 audit[5571]: USER_START pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.699000 audit[5573]: CRED_ACQ pid=5573 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:32.746748 kernel: audit: type=1103 audit(1707507692.699:1516): pid=5573 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:33.171368 sshd[5571]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:33.171000 audit[5571]: USER_END pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:33.175163 systemd[1]: sshd@14-10.200.8.12:22-10.200.12.6:60820.service: Deactivated successfully. Feb 9 19:41:33.176203 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:41:33.178048 systemd-logind[1284]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:41:33.179014 systemd-logind[1284]: Removed session 17. Feb 9 19:41:33.172000 audit[5571]: CRED_DISP pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:33.208680 kernel: audit: type=1106 audit(1707507693.171:1517): pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:33.208846 kernel: audit: type=1104 audit(1707507693.172:1518): pid=5571 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:33.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.12:22-10.200.12.6:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:38.132000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.137287 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:41:38.137429 kernel: audit: type=1400 audit(1707507698.132:1520): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.153695 kernel: audit: type=1300 audit(1707507698.132:1520): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000476580 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.132000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000476580 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.175418 kernel: audit: type=1327 audit(1707507698.132:1520): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.132000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.209039 kernel: audit: type=1400 audit(1707507698.132:1521): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.209187 kernel: audit: type=1300 audit(1707507698.132:1521): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f417c0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.132000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f417c0 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.231506 kernel: audit: type=1327 audit(1707507698.132:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.132000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.263659 kernel: audit: type=1400 audit(1707507698.132:1522): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.263788 kernel: audit: type=1300 audit(1707507698.132:1522): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f41900 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.132000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f41900 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.305734 kernel: audit: type=1327 audit(1707507698.132:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.293696 systemd[1]: Started sshd@15-10.200.8.12:22-10.200.12.6:54870.service. Feb 9 19:41:38.137000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.306429 kernel: audit: type=1400 audit(1707507698.137:1523): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:38.137000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f41a20 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:41:38.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:38.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.12:22-10.200.12.6:54870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:38.907000 audit[5583]: USER_ACCT pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:38.908349 sshd[5583]: Accepted publickey for core from 10.200.12.6 port 54870 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:38.909000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:38.909000 audit[5583]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd83ce7730 a2=3 a3=0 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:38.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:38.910188 sshd[5583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:38.915464 systemd-logind[1284]: New session 18 of user core. Feb 9 19:41:38.916151 systemd[1]: Started session-18.scope. Feb 9 19:41:38.922000 audit[5583]: USER_START pid=5583 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:38.924000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:38.983619 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.BJgjZy.mount: Deactivated successfully. Feb 9 19:41:39.410167 sshd[5583]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:39.411000 audit[5583]: USER_END pid=5583 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:39.411000 audit[5583]: CRED_DISP pid=5583 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:39.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.12:22-10.200.12.6:54870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:39.413813 systemd[1]: sshd@15-10.200.8.12:22-10.200.12.6:54870.service: Deactivated successfully. Feb 9 19:41:39.414954 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:41:39.415887 systemd-logind[1284]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:41:39.416915 systemd-logind[1284]: Removed session 18. Feb 9 19:41:44.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.12:22-10.200.12.6:54874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:44.517157 systemd[1]: Started sshd@16-10.200.8.12:22-10.200.12.6:54874.service. Feb 9 19:41:44.523109 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:41:44.523206 kernel: audit: type=1130 audit(1707507704.517:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.12:22-10.200.12.6:54874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:45.133000 audit[5657]: USER_ACCT pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.135538 sshd[5657]: Accepted publickey for core from 10.200.12.6 port 54874 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:45.151000 audit[5657]: CRED_ACQ pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.152868 sshd[5657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:45.160141 systemd[1]: Started session-19.scope. Feb 9 19:41:45.161146 systemd-logind[1284]: New session 19 of user core. Feb 9 19:41:45.170599 kernel: audit: type=1101 audit(1707507705.133:1534): pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.170751 kernel: audit: type=1103 audit(1707507705.151:1535): pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.190416 kernel: audit: type=1006 audit(1707507705.152:1536): pid=5657 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 19:41:45.190545 kernel: audit: type=1300 audit(1707507705.152:1536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59b1c160 a2=3 a3=0 items=0 ppid=1 pid=5657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:45.152000 audit[5657]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59b1c160 a2=3 a3=0 items=0 ppid=1 pid=5657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:45.206577 kernel: audit: type=1327 audit(1707507705.152:1536): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:45.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:45.171000 audit[5657]: USER_START pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.230226 kernel: audit: type=1105 audit(1707507705.171:1537): pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.230338 kernel: audit: type=1103 audit(1707507705.173:1538): pid=5662 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.173000 audit[5662]: CRED_ACQ pid=5662 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.659436 sshd[5657]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:45.659000 audit[5657]: USER_END pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.663387 systemd[1]: sshd@16-10.200.8.12:22-10.200.12.6:54874.service: Deactivated successfully. Feb 9 19:41:45.664276 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:41:45.665881 systemd-logind[1284]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:41:45.666836 systemd-logind[1284]: Removed session 19. Feb 9 19:41:45.659000 audit[5657]: CRED_DISP pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.679418 kernel: audit: type=1106 audit(1707507705.659:1539): pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.679468 kernel: audit: type=1104 audit(1707507705.659:1540): pid=5657 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:45.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.12:22-10.200.12.6:54874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:45.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.12:22-10.200.12.6:54876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:45.784505 systemd[1]: Started sshd@17-10.200.8.12:22-10.200.12.6:54876.service. Feb 9 19:41:46.397000 audit[5674]: USER_ACCT pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:46.399639 sshd[5674]: Accepted publickey for core from 10.200.12.6 port 54876 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:46.399000 audit[5674]: CRED_ACQ pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:46.399000 audit[5674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec13951c0 a2=3 a3=0 items=0 ppid=1 pid=5674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:46.399000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:46.401338 sshd[5674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:46.406874 systemd[1]: Started session-20.scope. Feb 9 19:41:46.407365 systemd-logind[1284]: New session 20 of user core. Feb 9 19:41:46.410000 audit[5674]: USER_START pid=5674 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:46.412000 audit[5676]: CRED_ACQ pid=5676 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.079586 sshd[5674]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:47.079000 audit[5674]: USER_END pid=5674 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.080000 audit[5674]: CRED_DISP pid=5674 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.083215 systemd[1]: sshd@17-10.200.8.12:22-10.200.12.6:54876.service: Deactivated successfully. Feb 9 19:41:47.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.12:22-10.200.12.6:54876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:47.084518 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:41:47.085355 systemd-logind[1284]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:41:47.086532 systemd-logind[1284]: Removed session 20. Feb 9 19:41:47.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.12:22-10.200.12.6:39252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:47.185005 systemd[1]: Started sshd@18-10.200.8.12:22-10.200.12.6:39252.service. Feb 9 19:41:47.816000 audit[5684]: USER_ACCT pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.817991 sshd[5684]: Accepted publickey for core from 10.200.12.6 port 39252 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:47.817000 audit[5684]: CRED_ACQ pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.817000 audit[5684]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb1bc4e80 a2=3 a3=0 items=0 ppid=1 pid=5684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:47.817000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:47.819644 sshd[5684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:47.824828 systemd[1]: Started session-21.scope. Feb 9 19:41:47.825657 systemd-logind[1284]: New session 21 of user core. Feb 9 19:41:47.828000 audit[5684]: USER_START pid=5684 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.830000 audit[5686]: CRED_ACQ pid=5686 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:47.852000 audit[5059]: AVC avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:41:47.852000 audit[5059]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a42c00 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:41:47.852000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:41:47.922000 audit[5095]: AVC avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:41:47.922000 audit[5095]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b6e560 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:41:47.922000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:41:49.302000 audit[5696]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.302000 audit[5696]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff05709250 a2=0 a3=7fff0570923c items=0 ppid=2587 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.304000 audit[5696]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.304000 audit[5696]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff05709250 a2=0 a3=7fff0570923c items=0 ppid=2587 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.325000 audit[5698]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.325000 audit[5698]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffda139a860 a2=0 a3=7ffda139a84c items=0 ppid=2587 pid=5698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.326000 audit[5698]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=5698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.326000 audit[5698]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffda139a860 a2=0 a3=31030 items=0 ppid=2587 pid=5698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.401386 sshd[5684]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:49.402000 audit[5684]: USER_END pid=5684 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:49.402000 audit[5684]: CRED_DISP pid=5684 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:49.405322 systemd[1]: sshd@18-10.200.8.12:22-10.200.12.6:39252.service: Deactivated successfully. Feb 9 19:41:49.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.12:22-10.200.12.6:39252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:49.406478 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:41:49.407224 systemd-logind[1284]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:41:49.408130 systemd-logind[1284]: Removed session 21. Feb 9 19:41:49.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.12:22-10.200.12.6:39256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:49.506511 systemd[1]: Started sshd@19-10.200.8.12:22-10.200.12.6:39256.service. Feb 9 19:41:50.121621 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 9 19:41:50.121757 kernel: audit: type=1101 audit(1707507710.114:1567): pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.114000 audit[5701]: USER_ACCT pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.121096 sshd[5701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:50.122126 sshd[5701]: Accepted publickey for core from 10.200.12.6 port 39256 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:50.127701 systemd[1]: Started session-22.scope. Feb 9 19:41:50.129279 systemd-logind[1284]: New session 22 of user core. Feb 9 19:41:50.119000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.155130 kernel: audit: type=1103 audit(1707507710.119:1568): pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.155266 kernel: audit: type=1006 audit(1707507710.119:1569): pid=5701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:41:50.166418 kernel: audit: type=1300 audit(1707507710.119:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd515ea9a0 a2=3 a3=0 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:50.119000 audit[5701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd515ea9a0 a2=3 a3=0 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:50.185164 kernel: audit: type=1327 audit(1707507710.119:1569): proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:50.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:50.133000 audit[5701]: USER_START pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.190463 kernel: audit: type=1105 audit(1707507710.133:1570): pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.135000 audit[5703]: CRED_ACQ pid=5703 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.223374 kernel: audit: type=1103 audit(1707507710.135:1571): pid=5703 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.888806 sshd[5701]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:50.889000 audit[5701]: USER_END pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.902798 systemd[1]: sshd@19-10.200.8.12:22-10.200.12.6:39256.service: Deactivated successfully. Feb 9 19:41:50.903706 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:41:50.909388 systemd-logind[1284]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:41:50.910829 systemd-logind[1284]: Removed session 22. Feb 9 19:41:50.912423 kernel: audit: type=1106 audit(1707507710.889:1572): pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.912525 kernel: audit: type=1104 audit(1707507710.889:1573): pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.889000 audit[5701]: CRED_DISP pid=5701 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:50.931438 kernel: audit: type=1131 audit(1707507710.901:1574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.12:22-10.200.12.6:39256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:50.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.12:22-10.200.12.6:39256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:50.993894 systemd[1]: Started sshd@20-10.200.8.12:22-10.200.12.6:39260.service. Feb 9 19:41:50.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.12:22-10.200.12.6:39260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:51.602000 audit[5712]: USER_ACCT pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:51.604548 sshd[5712]: Accepted publickey for core from 10.200.12.6 port 39260 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:51.604000 audit[5712]: CRED_ACQ pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:51.604000 audit[5712]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce07bb40 a2=3 a3=0 items=0 ppid=1 pid=5712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:51.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:51.606217 sshd[5712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:51.611616 systemd[1]: Started session-23.scope. Feb 9 19:41:51.612068 systemd-logind[1284]: New session 23 of user core. Feb 9 19:41:51.615000 audit[5712]: USER_START pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:51.617000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:52.103280 sshd[5712]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:52.103000 audit[5712]: USER_END pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:52.103000 audit[5712]: CRED_DISP pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:52.106579 systemd[1]: sshd@20-10.200.8.12:22-10.200.12.6:39260.service: Deactivated successfully. Feb 9 19:41:52.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.12:22-10.200.12.6:39260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:52.107666 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:41:52.108449 systemd-logind[1284]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:41:52.109352 systemd-logind[1284]: Removed session 23. Feb 9 19:41:53.978275 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.9bPhNr.mount: Deactivated successfully. Feb 9 19:41:55.800000 audit[5744]: NETFILTER_CFG table=filter:137 family=2 entries=20 op=nft_register_rule pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.807051 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 9 19:41:55.807181 kernel: audit: type=1325 audit(1707507715.800:1584): table=filter:137 family=2 entries=20 op=nft_register_rule pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.800000 audit[5744]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcfc604cc0 a2=0 a3=7ffcfc604cac items=0 ppid=2587 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.840208 kernel: audit: type=1300 audit(1707507715.800:1584): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcfc604cc0 a2=0 a3=7ffcfc604cac items=0 ppid=2587 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:55.800000 audit[5744]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.861099 kernel: audit: type=1327 audit(1707507715.800:1584): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:55.861239 kernel: audit: type=1325 audit(1707507715.800:1585): table=nat:138 family=2 entries=106 op=nft_register_chain pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.861268 kernel: audit: type=1300 audit(1707507715.800:1585): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffcfc604cc0 a2=0 a3=7ffcfc604cac items=0 ppid=2587 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.800000 audit[5744]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffcfc604cc0 a2=0 a3=7ffcfc604cac items=0 ppid=2587 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:55.891553 kernel: audit: type=1327 audit(1707507715.800:1585): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:57.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.12:22-10.200.12.6:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:57.222778 systemd[1]: Started sshd@21-10.200.8.12:22-10.200.12.6:41888.service. Feb 9 19:41:57.243429 kernel: audit: type=1130 audit(1707507717.221:1586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.12:22-10.200.12.6:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:57.853000 audit[5747]: USER_ACCT pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:57.856239 sshd[5747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:57.873430 kernel: audit: type=1101 audit(1707507717.853:1587): pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:57.873557 sshd[5747]: Accepted publickey for core from 10.200.12.6 port 41888 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:41:57.853000 audit[5747]: CRED_ACQ pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:57.878467 systemd[1]: Started session-24.scope. Feb 9 19:41:57.880002 systemd-logind[1284]: New session 24 of user core. Feb 9 19:41:57.902006 kernel: audit: type=1103 audit(1707507717.853:1588): pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:57.902207 kernel: audit: type=1006 audit(1707507717.853:1589): pid=5747 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:41:57.853000 audit[5747]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd69686ef0 a2=3 a3=0 items=0 ppid=1 pid=5747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:57.853000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:57.883000 audit[5747]: USER_START pid=5747 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:57.883000 audit[5749]: CRED_ACQ pid=5749 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:58.366993 sshd[5747]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:58.367000 audit[5747]: USER_END pid=5747 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:58.367000 audit[5747]: CRED_DISP pid=5747 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:41:58.371078 systemd[1]: sshd@21-10.200.8.12:22-10.200.12.6:41888.service: Deactivated successfully. Feb 9 19:41:58.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.12:22-10.200.12.6:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:58.372454 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:41:58.373421 systemd-logind[1284]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:41:58.374563 systemd-logind[1284]: Removed session 24. Feb 9 19:42:03.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.12:22-10.200.12.6:41902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:03.472939 systemd[1]: Started sshd@22-10.200.8.12:22-10.200.12.6:41902.service. Feb 9 19:42:03.506951 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:42:03.507126 kernel: audit: type=1130 audit(1707507723.471:1595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.12:22-10.200.12.6:41902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:04.089000 audit[5792]: USER_ACCT pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.091538 sshd[5792]: Accepted publickey for core from 10.200.12.6 port 41902 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:42:04.108000 audit[5792]: CRED_ACQ pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.110766 sshd[5792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:04.116566 systemd[1]: Started session-25.scope. Feb 9 19:42:04.117501 systemd-logind[1284]: New session 25 of user core. Feb 9 19:42:04.128419 kernel: audit: type=1101 audit(1707507724.089:1596): pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.128535 kernel: audit: type=1103 audit(1707507724.108:1597): pid=5792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.129409 kernel: audit: type=1006 audit(1707507724.108:1598): pid=5792 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:42:04.108000 audit[5792]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdba6e5010 a2=3 a3=0 items=0 ppid=1 pid=5792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.139567 kernel: audit: type=1300 audit(1707507724.108:1598): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdba6e5010 a2=3 a3=0 items=0 ppid=1 pid=5792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:04.157465 kernel: audit: type=1327 audit(1707507724.108:1598): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:04.124000 audit[5792]: USER_START pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.163413 kernel: audit: type=1105 audit(1707507724.124:1599): pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.126000 audit[5794]: CRED_ACQ pid=5794 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.182422 kernel: audit: type=1103 audit(1707507724.126:1600): pid=5794 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.585628 sshd[5792]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:04.585000 audit[5792]: USER_END pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.588934 systemd[1]: sshd@22-10.200.8.12:22-10.200.12.6:41902.service: Deactivated successfully. Feb 9 19:42:04.589835 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:42:04.591410 systemd-logind[1284]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:42:04.592387 systemd-logind[1284]: Removed session 25. Feb 9 19:42:04.585000 audit[5792]: CRED_DISP pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.606426 kernel: audit: type=1106 audit(1707507724.585:1601): pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.606495 kernel: audit: type=1104 audit(1707507724.585:1602): pid=5792 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:04.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.12:22-10.200.12.6:41902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:08.981132 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.Z1yCsC.mount: Deactivated successfully. Feb 9 19:42:09.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.12:22-10.200.12.6:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:09.691223 systemd[1]: Started sshd@23-10.200.8.12:22-10.200.12.6:50634.service. Feb 9 19:42:09.697068 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:42:09.697171 kernel: audit: type=1130 audit(1707507729.691:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.12:22-10.200.12.6:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:10.315000 audit[5824]: USER_ACCT pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.335832 sshd[5824]: Accepted publickey for core from 10.200.12.6 port 50634 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:42:10.336293 sshd[5824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:10.336587 kernel: audit: type=1101 audit(1707507730.315:1605): pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.335000 audit[5824]: CRED_ACQ pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.341667 systemd[1]: Started session-26.scope. Feb 9 19:42:10.342705 systemd-logind[1284]: New session 26 of user core. Feb 9 19:42:10.364417 kernel: audit: type=1103 audit(1707507730.335:1606): pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.364583 kernel: audit: type=1006 audit(1707507730.335:1607): pid=5824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:42:10.364617 kernel: audit: type=1300 audit(1707507730.335:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9969e360 a2=3 a3=0 items=0 ppid=1 pid=5824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.335000 audit[5824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9969e360 a2=3 a3=0 items=0 ppid=1 pid=5824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.382628 kernel: audit: type=1327 audit(1707507730.335:1607): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:10.335000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:10.348000 audit[5824]: USER_START pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.407049 kernel: audit: type=1105 audit(1707507730.348:1608): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.350000 audit[5826]: CRED_ACQ pid=5826 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.423117 kernel: audit: type=1103 audit(1707507730.350:1609): pid=5826 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.660444 systemd[1]: run-containerd-runc-k8s.io-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765-runc.rv3d23.mount: Deactivated successfully. Feb 9 19:42:10.692929 systemd[1]: run-containerd-runc-k8s.io-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c-runc.n0v1Wu.mount: Deactivated successfully. Feb 9 19:42:10.893977 sshd[5824]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:10.895000 audit[5824]: USER_END pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.897810 systemd[1]: sshd@23-10.200.8.12:22-10.200.12.6:50634.service: Deactivated successfully. Feb 9 19:42:10.898693 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:42:10.899845 systemd-logind[1284]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:42:10.900782 systemd-logind[1284]: Removed session 26. Feb 9 19:42:10.895000 audit[5824]: CRED_DISP pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.931566 kernel: audit: type=1106 audit(1707507730.895:1610): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.931758 kernel: audit: type=1104 audit(1707507730.895:1611): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:10.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.12:22-10.200.12.6:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:15.998222 systemd[1]: Started sshd@24-10.200.8.12:22-10.200.12.6:50648.service. Feb 9 19:42:15.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.12:22-10.200.12.6:50648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:16.003762 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:42:16.003839 kernel: audit: type=1130 audit(1707507735.998:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.12:22-10.200.12.6:50648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:16.609000 audit[5875]: USER_ACCT pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.610630 sshd[5875]: Accepted publickey for core from 10.200.12.6 port 50648 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:42:16.629422 kernel: audit: type=1101 audit(1707507736.609:1614): pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.628000 audit[5875]: CRED_ACQ pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.630143 sshd[5875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:16.636050 systemd[1]: Started session-27.scope. Feb 9 19:42:16.637214 systemd-logind[1284]: New session 27 of user core. Feb 9 19:42:16.650430 kernel: audit: type=1103 audit(1707507736.628:1615): pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.650552 kernel: audit: type=1006 audit(1707507736.629:1616): pid=5875 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:42:16.629000 audit[5875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac0a09c0 a2=3 a3=0 items=0 ppid=1 pid=5875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:16.658438 kernel: audit: type=1300 audit(1707507736.629:1616): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac0a09c0 a2=3 a3=0 items=0 ppid=1 pid=5875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:16.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:16.681619 kernel: audit: type=1327 audit(1707507736.629:1616): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:16.681761 kernel: audit: type=1105 audit(1707507736.642:1617): pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.642000 audit[5875]: USER_START pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.644000 audit[5877]: CRED_ACQ pid=5877 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:16.701418 kernel: audit: type=1103 audit(1707507736.644:1618): pid=5877 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:17.105176 sshd[5875]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:17.106000 audit[5875]: USER_END pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:17.109345 systemd[1]: sshd@24-10.200.8.12:22-10.200.12.6:50648.service: Deactivated successfully. Feb 9 19:42:17.110413 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:42:17.112152 systemd-logind[1284]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:42:17.113127 systemd-logind[1284]: Removed session 27. Feb 9 19:42:17.106000 audit[5875]: CRED_DISP pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:17.142105 kernel: audit: type=1106 audit(1707507737.106:1619): pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:17.142254 kernel: audit: type=1104 audit(1707507737.106:1620): pid=5875 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:17.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.12:22-10.200.12.6:50648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:21.242000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.247672 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:42:21.247777 kernel: audit: type=1400 audit(1707507741.242:1622): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.242000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.280538 kernel: audit: type=1400 audit(1707507741.242:1623): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.280679 kernel: audit: type=1300 audit(1707507741.242:1622): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025ead60 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:21.242000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025ead60 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:21.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:21.242000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad0990 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:21.361220 kernel: audit: type=1327 audit(1707507741.242:1622): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:21.361421 kernel: audit: type=1300 audit(1707507741.242:1623): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad0990 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:21.361470 kernel: audit: type=1327 audit(1707507741.242:1623): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:21.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:21.678000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.678000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c015affbc0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.720140 kernel: audit: type=1400 audit(1707507741.678:1624): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.720278 kernel: audit: type=1300 audit(1707507741.678:1624): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c015affbc0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.720311 kernel: audit: type=1327 audit(1707507741.678:1624): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.678000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.678000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.754418 kernel: audit: type=1400 audit(1707507741.678:1625): avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.678000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c015affce0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.678000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.679000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.679000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0094e0fc0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.679000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.679000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c015affdd0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.698000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.698000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0094e1000 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.698000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:21.698000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:21.698000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c015affe60 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:42:21.698000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:42:22.211261 systemd[1]: Started sshd@25-10.200.8.12:22-10.200.12.6:52126.service. Feb 9 19:42:22.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.12:22-10.200.12.6:52126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:22.819000 audit[5889]: USER_ACCT pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:22.820715 sshd[5889]: Accepted publickey for core from 10.200.12.6 port 52126 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:42:22.820000 audit[5889]: CRED_ACQ pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:22.820000 audit[5889]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcf7db000 a2=3 a3=0 items=0 ppid=1 pid=5889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:22.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:22.822411 sshd[5889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:22.827869 systemd[1]: Started session-28.scope. Feb 9 19:42:22.828561 systemd-logind[1284]: New session 28 of user core. Feb 9 19:42:22.831000 audit[5889]: USER_START pid=5889 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:22.833000 audit[5892]: CRED_ACQ pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:23.322777 sshd[5889]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:23.322000 audit[5889]: USER_END pid=5889 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:23.323000 audit[5889]: CRED_DISP pid=5889 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.12:22-10.200.12.6:52126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:23.326233 systemd-logind[1284]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:42:23.326489 systemd[1]: sshd@25-10.200.8.12:22-10.200.12.6:52126.service: Deactivated successfully. Feb 9 19:42:23.327539 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:42:23.328450 systemd-logind[1284]: Removed session 28. Feb 9 19:42:28.434684 systemd[1]: Started sshd@26-10.200.8.12:22-10.200.12.6:55004.service. Feb 9 19:42:28.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.12:22-10.200.12.6:55004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:28.440673 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:42:28.440808 kernel: audit: type=1130 audit(1707507748.434:1639): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.12:22-10.200.12.6:55004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:28.479230 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.pUdzBh.mount: Deactivated successfully. Feb 9 19:42:29.048000 audit[5906]: USER_ACCT pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.050046 sshd[5906]: Accepted publickey for core from 10.200.12.6 port 55004 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:42:29.068000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.070302 sshd[5906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:29.076280 systemd[1]: Started session-29.scope. Feb 9 19:42:29.077294 systemd-logind[1284]: New session 29 of user core. Feb 9 19:42:29.087354 kernel: audit: type=1101 audit(1707507749.048:1640): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.087487 kernel: audit: type=1103 audit(1707507749.068:1641): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.087554 kernel: audit: type=1006 audit(1707507749.068:1642): pid=5906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 19:42:29.068000 audit[5906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbda359d0 a2=3 a3=0 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:29.115035 kernel: audit: type=1300 audit(1707507749.068:1642): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbda359d0 a2=3 a3=0 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:29.115258 kernel: audit: type=1327 audit(1707507749.068:1642): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:29.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:29.124433 kernel: audit: type=1105 audit(1707507749.082:1643): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.082000 audit[5906]: USER_START pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.084000 audit[5931]: CRED_ACQ pid=5931 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.155112 kernel: audit: type=1103 audit(1707507749.084:1644): pid=5931 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.552190 sshd[5906]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:29.552000 audit[5906]: USER_END pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.555492 systemd-logind[1284]: Session 29 logged out. Waiting for processes to exit. Feb 9 19:42:29.557039 systemd[1]: sshd@26-10.200.8.12:22-10.200.12.6:55004.service: Deactivated successfully. Feb 9 19:42:29.557884 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 19:42:29.559282 systemd-logind[1284]: Removed session 29. Feb 9 19:42:29.552000 audit[5906]: CRED_DISP pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.589093 kernel: audit: type=1106 audit(1707507749.552:1645): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.589346 kernel: audit: type=1104 audit(1707507749.552:1646): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:42:29.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.12:22-10.200.12.6:55004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:38.133000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.138938 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:42:38.139070 kernel: audit: type=1400 audit(1707507758.133:1649): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.133000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.170868 kernel: audit: type=1400 audit(1707507758.133:1648): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.171028 kernel: audit: type=1300 audit(1707507758.133:1649): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00240c480 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.133000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00240c480 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.192421 kernel: audit: type=1327 audit(1707507758.133:1649): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.133000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8ef40 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.230364 kernel: audit: type=1300 audit(1707507758.133:1648): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8ef40 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.248223 kernel: audit: type=1327 audit(1707507758.133:1648): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.135000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.135000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00240c740 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.286233 kernel: audit: type=1400 audit(1707507758.135:1650): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.286430 kernel: audit: type=1300 audit(1707507758.135:1650): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00240c740 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.141000 audit[2297]: AVC avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.319927 kernel: audit: type=1327 audit(1707507758.135:1650): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.320120 kernel: audit: type=1400 audit(1707507758.141:1651): avc: denied { watch } for pid=2297 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:38.141000 audit[2297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b8ef60 a2=fc6 a3=0 items=0 ppid=2152 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:42:38.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:38.983770 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.lCur9J.mount: Deactivated successfully. Feb 9 19:42:40.665218 systemd[1]: run-containerd-runc-k8s.io-9e12515f0d8d0a23f300f839c0b86d5c16a061dde376bf64c8dd11ce4e85e765-runc.JhfDVg.mount: Deactivated successfully. Feb 9 19:42:40.696767 systemd[1]: run-containerd-runc-k8s.io-a5a4b344415807c2459e188e8edab268da6af71798d268e9ce252d34df580c2c-runc.5npqNS.mount: Deactivated successfully. Feb 9 19:42:47.854000 audit[5059]: AVC avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:42:47.859362 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:42:47.859524 kernel: audit: type=1400 audit(1707507767.854:1652): avc: denied { watch } for pid=5059 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2934568693/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c530,c615 tclass=file permissive=0 Feb 9 19:42:47.878296 kernel: audit: type=1300 audit(1707507767.854:1652): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ae2140 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:42:47.854000 audit[5059]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ae2140 a2=fc6 a3=0 items=0 ppid=4942 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c615 key=(null) Feb 9 19:42:47.854000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:42:47.914232 kernel: audit: type=1327 audit(1707507767.854:1652): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:42:47.923000 audit[5095]: AVC avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:42:47.923000 audit[5095]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d0b9c0 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:42:47.945423 kernel: audit: type=1400 audit(1707507767.923:1653): avc: denied { watch } for pid=5095 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_39_40.2146683956/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c266 tclass=file permissive=0 Feb 9 19:42:47.945490 kernel: audit: type=1300 audit(1707507767.923:1653): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d0b9c0 a2=fc6 a3=0 items=0 ppid=4978 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c266 key=(null) Feb 9 19:42:47.965021 kernel: audit: type=1327 audit(1707507767.923:1653): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:42:47.923000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:43:08.982815 systemd[1]: run-containerd-runc-k8s.io-a572d194a74152bf1c8e7d00bde5a1cce32376015ac620541200cb46e507c44a-runc.rFcFR2.mount: Deactivated successfully. Feb 9 19:43:14.943424 systemd[1]: cri-containerd-49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8.scope: Deactivated successfully. Feb 9 19:43:14.942000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:43:14.943783 systemd[1]: cri-containerd-49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8.scope: Consumed 6.383s CPU time. Feb 9 19:43:14.951850 kernel: audit: type=1334 audit(1707507794.942:1654): prog-id=118 op=UNLOAD Feb 9 19:43:14.951987 kernel: audit: type=1334 audit(1707507794.950:1655): prog-id=121 op=UNLOAD Feb 9 19:43:14.950000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:43:14.971668 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8-rootfs.mount: Deactivated successfully. Feb 9 19:43:14.973065 env[1321]: time="2024-02-09T19:43:14.973004005Z" level=info msg="shim disconnected" id=49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8 Feb 9 19:43:14.973065 env[1321]: time="2024-02-09T19:43:14.973060506Z" level=warning msg="cleaning up after shim disconnected" id=49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8 namespace=k8s.io Feb 9 19:43:14.973568 env[1321]: time="2024-02-09T19:43:14.973074406Z" level=info msg="cleaning up dead shim" Feb 9 19:43:14.982246 env[1321]: time="2024-02-09T19:43:14.982194993Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6128 runtime=io.containerd.runc.v2\n" Feb 9 19:43:15.117427 systemd[1]: cri-containerd-8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed.scope: Deactivated successfully. Feb 9 19:43:15.117782 systemd[1]: cri-containerd-8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed.scope: Consumed 4.417s CPU time. Feb 9 19:43:15.119000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:43:15.127419 kernel: audit: type=1334 audit(1707507795.119:1656): prog-id=85 op=UNLOAD Feb 9 19:43:15.119000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:43:15.134431 kernel: audit: type=1334 audit(1707507795.119:1657): prog-id=90 op=UNLOAD Feb 9 19:43:15.153139 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed-rootfs.mount: Deactivated successfully. Feb 9 19:43:15.155128 env[1321]: time="2024-02-09T19:43:15.155070418Z" level=info msg="shim disconnected" id=8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed Feb 9 19:43:15.155128 env[1321]: time="2024-02-09T19:43:15.155126820Z" level=warning msg="cleaning up after shim disconnected" id=8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed namespace=k8s.io Feb 9 19:43:15.155461 env[1321]: time="2024-02-09T19:43:15.155138920Z" level=info msg="cleaning up dead shim" Feb 9 19:43:15.164697 env[1321]: time="2024-02-09T19:43:15.164640514Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6154 runtime=io.containerd.runc.v2\n" Feb 9 19:43:15.741487 kubelet[2407]: I0209 19:43:15.741448 2407 scope.go:115] "RemoveContainer" containerID="49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8" Feb 9 19:43:15.743046 kubelet[2407]: I0209 19:43:15.743026 2407 scope.go:115] "RemoveContainer" containerID="8f36136d896a02bace38c998b05c6d58faa5441b766f0984920004d7899e66ed" Feb 9 19:43:15.743698 env[1321]: time="2024-02-09T19:43:15.743599017Z" level=info msg="CreateContainer within sandbox \"9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 19:43:15.746414 env[1321]: time="2024-02-09T19:43:15.746361873Z" level=info msg="CreateContainer within sandbox \"d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 19:43:15.773992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1656382537.mount: Deactivated successfully. Feb 9 19:43:15.797116 env[1321]: time="2024-02-09T19:43:15.797049607Z" level=info msg="CreateContainer within sandbox \"d8fe08f4495c8ab5a7c0cdad511a94b2a3e748325c1d0f40e21ca255c70b0dfc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"647702b960f96ab7d17df8e82c94ddfb76abfea2c5a78c0aaead5ccda5101aac\"" Feb 9 19:43:15.799998 env[1321]: time="2024-02-09T19:43:15.799954866Z" level=info msg="StartContainer for \"647702b960f96ab7d17df8e82c94ddfb76abfea2c5a78c0aaead5ccda5101aac\"" Feb 9 19:43:15.811154 env[1321]: time="2024-02-09T19:43:15.811102393Z" level=info msg="CreateContainer within sandbox \"9316eee2201cf8dc1c99aa9d6aeb9fbad86ecabcda3756b791870fc52fd0558a\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e\"" Feb 9 19:43:15.812576 env[1321]: time="2024-02-09T19:43:15.812538622Z" level=info msg="StartContainer for \"4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e\"" Feb 9 19:43:15.832898 systemd[1]: Started cri-containerd-647702b960f96ab7d17df8e82c94ddfb76abfea2c5a78c0aaead5ccda5101aac.scope. Feb 9 19:43:15.856508 systemd[1]: Started cri-containerd-4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e.scope. Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.877421 kernel: audit: type=1400 audit(1707507795.861:1658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.914825 kernel: audit: type=1400 audit(1707507795.861:1659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.914985 kernel: audit: type=1400 audit(1707507795.861:1660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.931417 kernel: audit: type=1400 audit(1707507795.861:1661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.946424 kernel: audit: type=1400 audit(1707507795.861:1662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.962530 kernel: audit: type=1400 audit(1707507795.861:1663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.875000 audit: BPF prog-id=212 op=LOAD Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2152 pid=6176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373730326239363066393661623764313764663865383263393464 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2152 pid=6176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373730326239363066393661623764313764663865383263393464 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit: BPF prog-id=213 op=LOAD Feb 9 19:43:15.878000 audit[6176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d6f20 items=0 ppid=2152 pid=6176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373730326239363066393661623764313764663865383263393464 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit: BPF prog-id=214 op=LOAD Feb 9 19:43:15.878000 audit[6176]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d6f68 items=0 ppid=2152 pid=6176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373730326239363066393661623764313764663865383263393464 Feb 9 19:43:15.878000 audit: BPF prog-id=214 op=UNLOAD Feb 9 19:43:15.878000 audit: BPF prog-id=213 op=UNLOAD Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { perfmon } for pid=6176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit[6176]: AVC avc: denied { bpf } for pid=6176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.878000 audit: BPF prog-id=215 op=LOAD Feb 9 19:43:15.878000 audit[6176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d7378 items=0 ppid=2152 pid=6176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373730326239363066393661623764313764663865383263393464 Feb 9 19:43:15.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.961000 audit: BPF prog-id=218 op=LOAD Feb 9 19:43:15.961000 audit[6192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ef8 items=0 ppid=2492 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636338386461383562613632333239343930366263616337343538 Feb 9 19:43:15.966000 audit: BPF prog-id=218 op=UNLOAD Feb 9 19:43:15.966000 audit: BPF prog-id=217 op=UNLOAD Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { perfmon } for pid=6192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit[6192]: AVC avc: denied { bpf } for pid=6192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:15.966000 audit: BPF prog-id=219 op=LOAD Feb 9 19:43:15.966000 audit[6192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025308 items=0 ppid=2492 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:15.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636338386461383562613632333239343930366263616337343538 Feb 9 19:43:16.009751 env[1321]: time="2024-02-09T19:43:16.009616040Z" level=info msg="StartContainer for \"647702b960f96ab7d17df8e82c94ddfb76abfea2c5a78c0aaead5ccda5101aac\" returns successfully" Feb 9 19:43:16.025716 env[1321]: time="2024-02-09T19:43:16.025657766Z" level=info msg="StartContainer for \"4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e\" returns successfully" Feb 9 19:43:17.164000 audit[6200]: AVC avc: denied { watch } for pid=6200 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:17.164000 audit[6200]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ff4000 a2=fc6 a3=0 items=0 ppid=2152 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:43:17.164000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:43:17.165000 audit[6200]: AVC avc: denied { watch } for pid=6200 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:17.165000 audit[6200]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000059ee0 a2=fc6 a3=0 items=0 ppid=2152 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c772 key=(null) Feb 9 19:43:17.165000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:43:20.068191 kubelet[2407]: E0209 19:43:20.067376 2407 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:43:20.148938 kubelet[2407]: E0209 19:43:20.148806 2407 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-e84cdbff2f.17b24949b8f493e0", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-e84cdbff2f", UID:"0d307a41ad66c96df537c6cebb9e60b8", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-e84cdbff2f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 9, 711315936, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 9, 711315936, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.12:35110->10.200.8.11:2379: read: connection timed out' (will not retry!) Feb 9 19:43:20.472086 kubelet[2407]: E0209 19:43:20.471951 2407 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.12:35310->10.200.8.11:2379: read: connection timed out" Feb 9 19:43:20.476204 systemd[1]: cri-containerd-063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335.scope: Deactivated successfully. Feb 9 19:43:20.476619 systemd[1]: cri-containerd-063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335.scope: Consumed 1.832s CPU time. Feb 9 19:43:20.479000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:43:20.488957 kernel: kauditd_printk_skb: 138 callbacks suppressed Feb 9 19:43:20.489077 kernel: audit: type=1334 audit(1707507800.479:1692): prog-id=77 op=UNLOAD Feb 9 19:43:20.479000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:43:20.496928 kernel: audit: type=1334 audit(1707507800.479:1693): prog-id=98 op=UNLOAD Feb 9 19:43:20.505844 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335-rootfs.mount: Deactivated successfully. Feb 9 19:43:20.507368 env[1321]: time="2024-02-09T19:43:20.507306789Z" level=info msg="shim disconnected" id=063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335 Feb 9 19:43:20.507781 env[1321]: time="2024-02-09T19:43:20.507371190Z" level=warning msg="cleaning up after shim disconnected" id=063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335 namespace=k8s.io Feb 9 19:43:20.507781 env[1321]: time="2024-02-09T19:43:20.507383690Z" level=info msg="cleaning up dead shim" Feb 9 19:43:20.516801 env[1321]: time="2024-02-09T19:43:20.516746378Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6249 runtime=io.containerd.runc.v2\n" Feb 9 19:43:20.761255 kubelet[2407]: I0209 19:43:20.761126 2407 scope.go:115] "RemoveContainer" containerID="063d8de33dfb9850d45b51dd3b85b219203ffd038f4b0bb5d0f1c09c6fe9f335" Feb 9 19:43:20.764096 env[1321]: time="2024-02-09T19:43:20.763990436Z" level=info msg="CreateContainer within sandbox \"7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 19:43:20.799970 env[1321]: time="2024-02-09T19:43:20.799915256Z" level=info msg="CreateContainer within sandbox \"7d84d1a30b9d998e0c311ba1b7111ed948122a96b5ea25b59ec75007f219aa69\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"62512cf4111426b020f04955856f27b52a2d1bb4e90ac829747fbc44a2d464f8\"" Feb 9 19:43:20.800579 env[1321]: time="2024-02-09T19:43:20.800542469Z" level=info msg="StartContainer for \"62512cf4111426b020f04955856f27b52a2d1bb4e90ac829747fbc44a2d464f8\"" Feb 9 19:43:20.839626 systemd[1]: Started cri-containerd-62512cf4111426b020f04955856f27b52a2d1bb4e90ac829747fbc44a2d464f8.scope. Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.884891 kernel: audit: type=1400 audit(1707507800.855:1694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.885065 kernel: audit: type=1400 audit(1707507800.855:1695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.897207 kernel: audit: type=1400 audit(1707507800.855:1696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.897549 kernel: audit: type=1400 audit(1707507800.855:1697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.917568 kernel: audit: type=1400 audit(1707507800.855:1698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.924653 kernel: audit: type=1400 audit(1707507800.855:1699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.953336 kernel: audit: type=1400 audit(1707507800.855:1700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.967580 kernel: audit: type=1400 audit(1707507800.855:1701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.855000 audit: BPF prog-id=220 op=LOAD Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2094 pid=6269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632353132636634313131343236623032306630343935353835366632 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2094 pid=6269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632353132636634313131343236623032306630343935353835366632 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.856000 audit: BPF prog-id=221 op=LOAD Feb 9 19:43:20.856000 audit[6269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c2930 items=0 ppid=2094 pid=6269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632353132636634313131343236623032306630343935353835366632 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit: BPF prog-id=222 op=LOAD Feb 9 19:43:20.870000 audit[6269]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c2978 items=0 ppid=2094 pid=6269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632353132636634313131343236623032306630343935353835366632 Feb 9 19:43:20.870000 audit: BPF prog-id=222 op=UNLOAD Feb 9 19:43:20.870000 audit: BPF prog-id=221 op=UNLOAD Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { perfmon } for pid=6269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit[6269]: AVC avc: denied { bpf } for pid=6269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.870000 audit: BPF prog-id=223 op=LOAD Feb 9 19:43:20.870000 audit[6269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c2d88 items=0 ppid=2094 pid=6269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632353132636634313131343236623032306630343935353835366632 Feb 9 19:43:20.995826 env[1321]: time="2024-02-09T19:43:20.995761084Z" level=info msg="StartContainer for \"62512cf4111426b020f04955856f27b52a2d1bb4e90ac829747fbc44a2d464f8\" returns successfully" Feb 9 19:43:21.505407 systemd[1]: run-containerd-runc-k8s.io-62512cf4111426b020f04955856f27b52a2d1bb4e90ac829747fbc44a2d464f8-runc.py4f1r.mount: Deactivated successfully. Feb 9 19:43:21.679000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.679000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00c5dfc50 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:21.679000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.679000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00c5dfc80 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:21.679000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.679000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00c5dfd70 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:21.680000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.680000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c014f914a0 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.680000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:21.699000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.699000 audit[2253]: AVC avc: denied { watch } for pid=2253 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:43:21.699000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c01417a520 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.699000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:21.699000 audit[2253]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00c5dfe30 a2=fc6 a3=0 items=0 ppid=2112 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c29,c982 key=(null) Feb 9 19:43:21.699000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:43:22.643701 kubelet[2407]: I0209 19:43:22.643652 2407 status_manager.go:809] "Failed to get status for pod" podUID=0d307a41ad66c96df537c6cebb9e60b8 pod="kube-system/kube-apiserver-ci-3510.3.2-a-e84cdbff2f" err="rpc error: code = Unavailable desc = keepalive ping failed to receive ACK within timeout" Feb 9 19:43:27.576461 systemd[1]: cri-containerd-4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e.scope: Deactivated successfully. Feb 9 19:43:27.591481 kernel: kauditd_printk_skb: 67 callbacks suppressed Feb 9 19:43:27.591652 kernel: audit: type=1334 audit(1707507807.575:1718): prog-id=216 op=UNLOAD Feb 9 19:43:27.575000 audit: BPF prog-id=216 op=UNLOAD Feb 9 19:43:27.612964 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e-rootfs.mount: Deactivated successfully. Feb 9 19:43:27.612000 audit: BPF prog-id=219 op=UNLOAD Feb 9 19:43:27.619563 kernel: audit: type=1334 audit(1707507807.612:1719): prog-id=219 op=UNLOAD Feb 9 19:43:27.672176 env[1321]: time="2024-02-09T19:43:27.672117180Z" level=info msg="shim disconnected" id=4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e Feb 9 19:43:27.672176 env[1321]: time="2024-02-09T19:43:27.672181281Z" level=warning msg="cleaning up after shim disconnected" id=4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e namespace=k8s.io Feb 9 19:43:27.672845 env[1321]: time="2024-02-09T19:43:27.672195781Z" level=info msg="cleaning up dead shim" Feb 9 19:43:27.682205 env[1321]: time="2024-02-09T19:43:27.682152277Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6317 runtime=io.containerd.runc.v2\n" Feb 9 19:43:27.783598 kubelet[2407]: I0209 19:43:27.783449 2407 scope.go:115] "RemoveContainer" containerID="49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8" Feb 9 19:43:27.784328 kubelet[2407]: I0209 19:43:27.783884 2407 scope.go:115] "RemoveContainer" containerID="4acc88da85ba623294906bcac745811dcdc032b7a6ab6928c586b859e9fbbe5e" Feb 9 19:43:27.784328 kubelet[2407]: E0209 19:43:27.784316 2407 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-7ff8dc855-pbw9n_tigera-operator(640dec0e-89e2-44eb-ae6c-f39dcf778e4f)\"" pod="tigera-operator/tigera-operator-7ff8dc855-pbw9n" podUID=640dec0e-89e2-44eb-ae6c-f39dcf778e4f Feb 9 19:43:27.785728 env[1321]: time="2024-02-09T19:43:27.785673509Z" level=info msg="RemoveContainer for \"49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8\"" Feb 9 19:43:27.798552 env[1321]: time="2024-02-09T19:43:27.798490960Z" level=info msg="RemoveContainer for \"49bd991d90a7cf09994244e4e1b06a3fb07681d5792563e7831f8cdea1da82d8\" returns successfully" Feb 9 19:43:28.468923 systemd[1]: run-containerd-runc-k8s.io-260c0c63d725a72209fc46e5d60c9409c66d5d0aa1e4aaaa09118ccbd5356a28-runc.5mRS4A.mount: Deactivated successfully. Feb 9 19:43:30.472349 kubelet[2407]: E0209 19:43:30.472307 2407 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-e84cdbff2f?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"